US20140362844A1 - Wireless communication system, wireless communication apparatus, wireless communication method, and computer program - Google Patents
Wireless communication system, wireless communication apparatus, wireless communication method, and computer program Download PDFInfo
- Publication number
- US20140362844A1 US20140362844A1 US14/463,302 US201414463302A US2014362844A1 US 20140362844 A1 US20140362844 A1 US 20140362844A1 US 201414463302 A US201414463302 A US 201414463302A US 2014362844 A1 US2014362844 A1 US 2014362844A1
- Authority
- US
- United States
- Prior art keywords
- communication
- packet
- transmission
- station
- rate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 785
- 238000000034 method Methods 0.000 title claims description 200
- 238000004590 computer program Methods 0.000 title description 15
- 238000012545 processing Methods 0.000 claims description 30
- 101100172132 Mus musculus Eif3a gene Proteins 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 374
- 230000002093 peripheral effect Effects 0.000 description 18
- 230000004044 response Effects 0.000 description 14
- 238000001514 detection method Methods 0.000 description 13
- 230000007246 mechanism Effects 0.000 description 8
- 238000012790 confirmation Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000007423 decrease Effects 0.000 description 2
- 230000007257 malfunction Effects 0.000 description 2
- 230000010363 phase shift Effects 0.000 description 2
- 238000012163 sequencing technique Methods 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0808—Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
- H04W74/0816—Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA] with collision avoidance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/18—Phase-modulated carrier systems, i.e. using phase-shift keying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/18—Phase-modulated carrier systems, i.e. using phase-shift keying
- H04L27/20—Modulator circuits; Transmitter circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/32—Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/35—Flow control; Congestion control by embedding flow control information in regular packets, e.g. piggybacking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0053—Allocation of signaling, i.e. of overhead other than pilot signals
- H04L5/0055—Physical resource allocation for ACK/NACK
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
- H04W28/22—Negotiating communication rate
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0841—Random access procedures, e.g. with 4-step access with collision treatment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0841—Random access procedures, e.g. with 4-step access with collision treatment
- H04W74/085—Random access procedures, e.g. with 4-step access with collision treatment collision avoidance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to a wireless communication system, a wireless communication apparatus, a wireless communication method, and a computer program for performing mutual communication among a plurality of wireless stations like a wireless local area network (LAN).
- the present invention relates to a wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program in which each communication station performs random access on the basis of carrier detection in accordance with the carrier sense multiple access with collision avoidance (CSMA) system.
- CSMA carrier sense multiple access with collision avoidance
- the present invention relates to a wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program for realizing random access in a communication environment in which a plurality of communication modes each having a transmission rate different from each other is intermixed.
- the present invention relates to a wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program for realizing random access with a smaller overhead under a communication environment in which a plurality of communication modes each having a transmission rate different from each other is intermixed.
- a wireless LAN is noticed as a system for releasing a user from LAN wiring of the wired system. Because almost all of wiring cables can be omitted in a work space such as an office in case of the wireless LAN, communication terminals such as personal computers (PC's) can be relatively easily moved.
- PC's personal computers
- IEEE 802.11 As normal standards with regard to the wireless network, Institute of Electrical and Electronics Engineers (IEEE) 802.11 (see, for example, Non-Patent Document 1), High Performance Wireless Local Area Network (HIPERLAN)/2 (see, for example, Non-Patent Document 2 or Non-Patent Document 3), IEEE 802.15.3, Bluetooth communication and the like can be cited.
- the IEEE 802.11 standard includes various wireless communication systems such as an IEEE 802.11a standard and an IEEE 802.11b standard according to the differences of a wireless communication system, a frequency band to be used, and the like.
- a method of providing an apparatus to be a control station called as an “access point” or a “coordinator” in an area to form a network under the generalized control by the control station for constituting a local area network by means of a wireless technique is generally used.
- a wireless network locating an access point therein widely adopts an access control method based on a band reservation, in which when a certain communication apparatus performs an information transmission, the communication apparatus first reserves a band necessary for the information transmission at an access point for using a transmission path in order not to generate any collisions with the information transmission of another communication apparatus. That is, the wireless network performs a synchronized wireless communication in which each communication apparatus in the wireless network is synchronized with each other by locating the access point.
- an “ad-hoc communication” in which terminals are directly perform wireless communications with each other asynchronously has been devised.
- the ad-hoc communication by which arbitrary terminals can directly perform asynchronous wireless communications with each other without using a specific access point, is considered to be suitable.
- an ad-hoc network has the following features. That is, even if a terminal is in trouble or the power source thereof is off, a routing can be automatically changed, and consequently the network is difficult to break. Also, data can be transmitted relatively long distance while keeping a high-speed data rate by making a packet hop a plurality of times between mobile stations.
- ad-hoc system Many development examples with regard to the ad-hoc system are known (see, for example, Non-Patent Document 4).
- an ad-hoc mode in which terminals operate in an autonomous distributed way in peer to peer without locating any control station is prepared.
- CSMA carrier sense multiple access with collision avoidance
- a communication method based on the CSMA/CA is described with reference to FIG. 11 .
- it is supposed that there are four communication stations #0 to #3 under a certain communication environment.
- Each communication station having transmission data monitors a medium state for a predetermined inter frame space, or a distributed coordination function (DCF) inter frame space (DIFS), from the last detection of a packet.
- DCF distributed coordination function
- DIFS distributed coordination function inter frame space
- the communication station #0 after monitoring the medium state for an inter frame space DIFS, the communication station #0, which has the random backoff set to be shorter than that of the other peripheral stations, acquires the transmission right to be able to start a data transmission to the communication station #1.
- the communication station #0 stores the information for a network allocation vector (NAV), and describes a period of time until the completion of the transaction of a data communication in a duration field of the header of a MAC frame (MAC header).
- NAV network allocation vector
- the communication station #1 or the transmission destination of the data frame, performs a reception operation of the data addressed to the local station for the duration of the Duration described in the MAC header.
- the communication station #1 returns an ACK packet to the communication station #0, or the data transmission source.
- the communication stations #2 and #3 which have received the data frame, and which are not the data transmission destinations, decode the description in the Duration field of the MAC header, and recognize the state in which the medium is occupied without monitoring the medium until the transaction ends to stop the transmission.
- the work is called that the peripheral stations “raise a NAV”, or the like.
- the NAV is effective over the duration indicated in the Duration field. For example, the duration until the communication station #1, or the reception destination, will return the ACK packet is specified as the Duration.
- contention is avoided while a single communication station acquires a transmission right, and while peripheral stations stop their data transmission operations during the duration of the data communication operation, and thereby collisions can be avoided.
- a concealed terminal problem is generated in a wireless LAN network in an ad hoc environment.
- the concealed terminal indicates a communication station which a communication station on one side of a communication party can hear but a communication station on the other side of the communication party cannot hear in case of performing a communication between certain specific communication stations. Because no negotiations can be performed between concealed terminals, there is the possibility that transmission operations collide with each other only by the above-mentioned CSMA/CA system.
- a CSMA/CA in accordance with an RTS/CTS procedure is known as a methodology for solving the concealed terminal problem. Also in the IEEE 802.11, the methodology is adopted.
- a data transmission source communication station transmits a transmission request packet Request To Send (RTS), and starts a data transmission in response to the reception of a confirmation note packet Clear To Send (CTS) from a data transmission destination communication station.
- RTS transmission request packet Request To Send
- CTS Clear To Send
- a concealed terminal receives at least one of the RTS and the CTS
- the concealed terminal sets a transmission stop duration of the local station for the duration in which the data transmission based on the RTS/CTS procedure is expected to be performed, and thereby collisions can be avoided.
- the concealed terminal for a transmission station receives the CTS to set a transmission stop duration for avoiding the collision with a data packet.
- the concealed terminal for a reception station receives the RTS to stop the transmission duration for avoiding the collision with the ACK.
- FIG. 12 shows an operation example of the RTS/CTS procedure.
- the communication stations #0 to #3 are supposed to be in the following state. That is, the communication station #2 can communicate with the adjacent communication station #0.
- the communication station #0 can communicate with the adjacent communication stations #1 and #2.
- the communication station #1 can communicate with the adjacent communication stations #0 and #3.
- the communication station #3 can communicate with the adjacent communication station #1.
- the communication station #2 is a concealed terminal for the communication station #1
- the communication station #3 is a concealed terminal for the communication station #0.
- Each communication station having transmission data monitors a medium state for a predetermined inter frame space DIFS (DCF Inter Frame Space) until the communication station has detected a packet last.
- DIFS DCF Inter Frame Space
- the communication station performs random backoff.
- the communication station is given a transmission right.
- the communication station #0 which has set the random backoff shorter than that of the other peripheral stations after the monitoring of the medium state for the inter frame space DIFS, can acquire the transmission right to start the data transmission to the communication station #1.
- the communication station #0 which transmits data, transmits a transmission request packet (RTS) to the communication station #1.
- the communication station #1 being the reception destination returns a confirmation note (CTS) to the communication station #0 after a shorter inter frame space Short IFS (SIFS).
- CTS confirmation note
- SIFS short inter frame space Short IFS
- the communication station #1 responds to the reception of the CTS packet to start the transmission of a data packet after the inter frame space SIFS.
- the communication station #1 completes the reception of the data packet, the communication station #1 returns an ACK packet with an inter frame space SIFS put between. Because the inter frame space SIFS is shorter than the inter frame space DIFS, the communication station #1 can transmit the CTS packet before the other stations, which acquires the transmission right after waiting for DIFS+random backoff in accordance with a CMSA/CA procedure.
- the communication station #2 and the communication station #3 both located at positions where both of them can be concealed terminals from both of the communication station #0 and the communication station #1, performs control to detect the use of a transmission path by the reception of the RTS or the CTS, and not to perform any transmissions until the communication ends.
- the communication station #2 detects the start of the data transmission of the communication station #1 as the transmission source on the basis of an RTS packet, and decodes the Duration field described in the MAC header of the RTS packet, and further recognizes that the transmission path has been already used after that for the duration until the successive transmission of the data packet is completed (the duration until the end of ACK). Thereby, the communication station #2 can raise a NAV.
- the communication station #3 detects the 25 start of the data transmission of the communication station #1 as the reception destination on the basis of the CTS packet, and decodes the Duration field described in the MAC header of the CTS packet, and further recognizes that the transmission path has been already used after that during the duration until the transmission of the successive data packet is completed (the duration until the ACK had ended). Thereby, the communication station #3 can raise a NAV.
- the concealed terminal when a concealed terminal receives at least one of the RTS and the CTS, the concealed terminal sets the transmission stop duration of the local station for the duration to be expected to perform the data transmission based on the RTS/CTS procedure. Consequently, collisions can be avoided.
- a communication station in accordance with the IEEE 802.11g (hereinafter also referred to “high-grade communication station” simply) can also operate in accordance with the IEEE 802.11b, and can transmit a data packet also at a high-speed rate at which a conventional communication station in accordance with the IEEE 802.11b (hereinafter also referred to as “conventional station” simply) cannot perform any reception.
- the communication station #0 and the communication station #1 can exchange a data packet at a high-speed rate in conformity with IEEE 802.11g.
- the communication station #2 and the communication station #3 around the communication station #0 and the communication station #1 are conventional stations which do not conform to the IEEE 802.11g, the communication stations #2 and #3 cannot decode the Duration described in the MAC header as a result of being unable to receive the data packet. Consequently, there is the possibility that the communication stations #2 and #3 start their communication operation even in the duration of the Duration to generate a collision (sec FIG. 13 ).
- the present inventors consider that the problem of the coexistence of the IEEE 802.11g and the IEEE 802.11b is preferably solved by the setting of the IEEE 802.11g, being a higher rank standard, to assure ad-hoc compatibility.
- a method of performing the exchange of an RTS/CTS packet at a transmission rate at which a conventional station can receive the RTS/CTS packet before the transmission of a data packet in IEEE 802.11g can be considered (see FIG. 14 ).
- peripheral conventional stations decodes the Duration field described in the MAC header of the RTS/CTS packet, and recognize that the transmission path has already used for the duration until the completion of the transmission of the successive data packet after that (the duration until ACK ends).
- the peripheral conventional stations can raise an NAV only for suitable duration. That is, the conventional stations cannot hear a data packet to be transmitted at a high-speed rate, but that turns to be no problem for avoiding a collision.
- a procedure for securing a band in accordance with the above-mentioned procedure before the transmission of a data packet is generally called a virtual carrier sense.
- a first aspect of the present invention is a wireless communication system in which a first communication station operating according to a first communication method and a second communication station capable of operating according to both of the first communication method and a second communication method coexist, wherein the second communication station transmits a packet composed of a first decoding portion capable of being received according to the first communication method, and a second decoding portion capable of being received according to the second communication method.
- system hereupon indicates a matter made of a plurality of logically aggregate apparatus (or logically aggregate functional modules realizing specific functions), and it does not matter whether each of the apparatus or the functional modules is in a single housing or not.
- the first communication method hereupon corresponds to, for example, the IEEE 802.11b being a wireless LAN specification using a 2.4 GHz band
- the second communication method corresponds to the IEEE 802.11g supporting a high-speed communication rate as a higher rank standard of the IEEE 802.11b.
- the local station transmits a data packet as a data transmission station, and hopes that peripheral stations stop their communication operations for expected duration until an ACK is returned from a reception station.
- the local station transmits an RTS or a CTS packet, and hopes that the peripheral stations stop their communication operations for the expected duration until the ACK is returned.
- the second communication station operating in accordance with the higher rank standard performs a packet transmission according to the second communication method, a conventional station cannot receive the data packet transmitted at a high-speed rate, and cannot decode a duration described in a MAC header. Then, the conventional station cannot raise a NAV suitably, and cannot avoid a collision.
- a packet is composed of a first decoding portion capable of being received according to a first communication method, and a second decoding portion capable of being received according to a second communication method.
- the first decoding portion includes information related to a packet length and a transmission rate of the packet.
- the first communication station that receives the packet calculates (packet length)/(transmission rate) on the basis of the packet length and the transmission rate of the packet, both capable of being obtained by decoding the first decoding portion, in order to obtain a residual reception period of time of the packet.
- the second communication station when the second communication station performs a communication procedure according to the second communication method, the second communication station describes spoofed information of a packet length and a transmission rate in the first decoding portion like the indication of the duration for which communication operations of the other stations are stopped by (packet length)/(transmission rate) for the sake of the communication procedure.
- the first communication station cannot receive the second decoding portion of the packet, but can avoid a collision by calculating the (packet length)/(transmission rate) on the basis of the description in the first decoding portion to raise the NAV for desired duration, and by stopping any data transmissions.
- the second communication station performing a packet transmission spoofs about the information of the packet length and the transmission rate to be described in the first decoding portion in order that the first communication station receiving the packet may stop its communication operation for the duration until a communication transaction to be performed according to the second communication method ends.
- the second communication station performing the second communication method realizes the so-called upper compatibility to the first communication station.
- the duration until the communication transaction ends hereupon specifically indicates the duration until an ACK transmission ends in a communication procedure performed according to the second communication method.
- the duration hereupon indicates the duration until all of the ACK transmissions performed in a time division multiplex from each remote station end.
- the transmission of the ACK packet hereupon is not limited to the case of single ACK packet, but includes, for example, the case where the ACK packet is multiplexed with other kinds of packets such as an RTS packet, a CTS packet, and data packet to be transmitted.
- each second communication station realizes the mechanism of the ad-hoc compatibility, it is necessary for each second communication station to recognize that the information of the packet length and the transmission rate described in the first decoding portion is spoofed. Moreover, it is necessary that each second communication station mutually recognizes the spoofing of the information while the first communication station cannot know the spoofing of the information to operate in accordance with the description in the first decoding portion.
- the second communication station performing a packet transmission describes whether the spoofed information of a packet length and a transmission rate is described in the first decoding portion or not in a packet in a format which the second communication station capable of operating according to the second communication method can decode the spoofed information but the first communication station operating according to the first communication method cannot decode the spoofed information.
- the second communication station performing a packet transmission indicates whether the spoofed information of the packet length and the transmission rate is described or not by means of a spoofed flag in the first decoding portion.
- the second communication station when the second communication station being a data reception side detects that the information of the packet length and the transmission rate in the first decoding portion of a packet received from another station is spoofed, the second communication station switches its reception method to the second communication method, and can perform the reception operation of the residual portion of the packet.
- the second communication station performing a packet transmission may be provided with a known second communication method decoding portion, in which all of the second communication stations can decode data, in a packet, and may describe whether spoofed information of a packet length and a transmission rate is described or not in the second communication method decoding portion for notifying the other second communication stations of the spoofing.
- a known second communication method decoding portion in which all of the second communication stations can decode data, in a packet, and may describe whether spoofed information of a packet length and a transmission rate is described or not in the second communication method decoding portion for notifying the other second communication stations of the spoofing.
- an actually used communication mode may be described in the second communication method decoding portion.
- a second communication station performing a packet transmission transmits the second communication method decoding portion in a communication method in which all of the second communication stations can decode the data in the second communication method decoding portion but the first communication stations cannot decode the data.
- the second communication station performing the packet transmission transmits the second communication method decoding portion at a low transmission rate of about 6 Mbps in order that all of the second communication stations can receive, but the second communication station performing the packet transmission performs the modulation processing of the second communication method decoding portion in accordance with a modulation system which each of the second communication stations knows but the first communication stations do not know.
- only the second communication stations can demodulate the second communication method decoding portion to recognize that the first decoding portion is spoofed.
- a second communication station receiving the packet tries to decode the second communication method decoding portion by means of both of the first communication method and the communication method by which the first communication station cannot decode the second communication method decoding portion, and the second communication station can recognize that the first decoding portion is spoofed by the fact that the second communication method decoding portion can be decoded according to the latter method. Then, the second communication station can performs the reception processing of the second decoding portion in accordance with the communication mode obtained from the second communication method decoding portion.
- the second communication station locates the second communication method decoding portion before the second decoding portion in a packet. Then, when the second communication station describes the spoofed information of a packet length and a transmission rate for the first communication stations in the first decoding portion, the second communication station describes the information related to an actual packet length and a transmission rate in the second decoding portion in the second communication method decoding portion. In such a case, a second communication station receiving the packet can perform the reception operation of the second decoding portion after the second communication method decoding portion of the received packet on the basis of the information related to the packet length and the transmission rate described in the second communication method decoding portion.
- a second communication station performing a packet transmission can make data to be able to be decoded by all of the second communication stations and to be unable to be decoded by the first communication stations by modulating the second communication method decoding portion in accordance with a modulation system which only each of the second communication station knows. For example, when the second communication station performs a phase modulation such as BASK to the second communication method decoding portion, the second communication station may give a phase difference ⁇ , which is jointly owned by the second communication station, to the location of a signal point ( ⁇ 1, 1), or may translation the signal point by the known quantity ⁇ d.
- ⁇ phase difference
- a second communication station receiving the packet performs phase demodulation in consideration of the phase shifts of the location of the signal point such as the phase difference ⁇ , the movement quantity ⁇ d and the like. Then, it can be known that the first decoding portion is spoofed by the fact that the second communication method decoding portion can be decoded.
- a situation in which the second communication station can receive a second communication method decoding portion, which is transmitted at a low transmission rate, but cannot receive the second decoding portion, which is transmitted at a high-speed transmission rate, owing to an S/N, can be also supposed.
- a second communication station receiving a packet tries to perform the reception operation of a second decoding portion on the basis of the information related to a packet length and a transmission rate described in the second communication method decoding portion of the received packet.
- the second communication station may obtain a difference between a period of time (i.e. (packet length)/(transmission rate)) obtained from the spoofed packet length and the transmission rate described in the first decoding portion and a period of time (i.e. (packet length)/(transmission rate)) obtained from the packet and the transmission rate described in the second communication method decoding portion, and may restrain the transmission of a packet for a predetermined period of time.
- a period of time i.e. (packet length)/(transmission rate)
- the wireless communication system supposes, for example, a communication environment in which a conventional station operating in accordance with the IEEE 802.11b and a high-grade communication station operating in conformity with the IEEE 802.11g corresponding to a high-speed edition standard using the same band intermixedly operate.
- a packet to be transmitted is composed of a known fixed rate portion (hereinafter also referred to as “general decoding portion”) which all of the communication stations can decode, and an arbitrary rate portion (hereinafter also referred to as “high-grade decoding portion”) which possibly only a part of the communication station being at a high-grade can decode.
- general decoding portion a known fixed rate portion
- high-grade decoding portion an arbitrary rate portion
- the general decoding portion of a packet generally describes a residual length of the packet and a rate at which residual packets are transmitted therein. Consequently, a communication station receiving the packet tries to receive the residual part of the packet by performing the reception operation of the packet at a specified rate for the duration of (packet length)/(rate).
- a high-grade communication station performs a packet transmission at a transmission rate at which a conventional station cannot receive the packet.
- the information of a packet length and a rate in the general decoding portion is spoofed in order that the value of (packet length)/(rate) may be the duration for which the communication is desired to be stopped.
- the value of (packet length)/(rate) should originally correspond to the reception duration of the residual portion of the packet.
- the information is spoofed in order to be the duration for which a NAV such as the end of ACK should be raised.
- the high-grade communication station to be a communication party is needed to detect that these values described in the general decoding portion are spoofed for performing a correct reception operation without performing any malfunctions on the basis of the spoofed rate and the length. For this sake, a flag indicating the existence of spoofing is provided in the general decoding portion of a packet.
- a second communication method decoding portion which all second communication stations can decode, is provided, and the fact that the general decoding portion is spoofed is described in the second communication method decoding portion. Then, after the general decoding portion has been transmitted, the high-grade communication station shifts to an arbitrary high grade rate mode, and transmits an actual data composed of a high-grade decoding portion.
- the conventional station When the conventional station receives a general decoding portion including the spoofed information of a packet length and a rate, the conventional station believes the packet length and the rate to receive the residual packet at a specified rate for a period of (packet length)/(rate). Because the rate and the packet length are different from ones at which the packet is actually transmitted, the conventional station cannot decode the packet correctly, and the packet is destroyed.
- a high-grade communication station detects that the information of a packet length and a rate is spoofed by means of the flag in the general decoding portion.
- the high-grade communication station detects the spoofing owing to the capability of decoding the second communication method decoding portion. Then, when the general decoding portion is spoofed, the high-grade communication station shifts to the corresponding high grade rate mode, and receives the residual packet, i.e. a high-grade decoding portion.
- the high-grade communication station can decode actual data.
- a second aspect of the present invention is a computer program described in a form capable of being read by a computer to execute on a computer system processing for a wireless communication operation in a wireless communication environment in which a first communication method and a second communication method coexist, the program including the steps of: generating a transmission packet composed of a first decoding portion and a second decoding portion, transmitting a first decoding portion of the transmission packet according to the first communication method, and transmitting a second decoding portion of the transmission packet according to the second communication method, receiving and analyzing a first decoding portion of a reception packet from another station, and receiving and analyzing a second decoding portion of the reception packet according to the second communication method.
- the computer program according to the second aspect of the present invention defines a computer program described in the form capable of being read by a computer for realizing predetermined processing on a computer system.
- a cooperative operation is exhibited on the computer system, and the computer system operates as a wireless communication apparatus.
- each communication station can suitably perform random access on the basis of a carrier detection according to a CSMA system.
- a superior wireless communication system it is possible to provide a superior wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program in which random access can be realized in a communication environment in which a plurality of communication modes each having a transmission rate different from each other intermixes.
- a superior wireless communication system it is possible to provide a superior wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program in which random access can be realized with a smaller overhead in a communication environment in which a plurality of communication mode, each having a transmission rate different from each other, intermixes.
- the coexistence of the IEEE 802.11g and the IEEE 802.11a/b, both using the same band can be realized without passing an RTS/CTS procedure. Consequently, an overhead can be remarkably reduced.
- the duration for an NAV can be flexibly set. Consequently, the throughput of a system can be improved.
- FIG. 1 is a view schematically showing a functional configuration of a wireless communication apparatus operating as a communication station in a wireless network according to one embodiment of the present invention
- FIG. 2 is a view for illustrating a mechanism of a priority transmission based on difference of inter frame spaces
- FIG. 3 is a view schematically showing one example of a frame configuration of a packet in the wireless network according to the present invention
- FIG. 4 is view schematically showing a variation of a packet structure in the wireless network according to the present invention.
- FIG. 5 is a view showing a description example of Rate field in the IEEE 802.11a
- FIG. 6 is a flowchart showing a reception processing procedure in the case where a wireless communication apparatus 100 operates as a conventional station;
- FIG. 7 is a flowchart showing a reception processing procedure in the case where the wireless communication apparatus 100 operates as a high-grade communication station;
- FIG. 8 is a view showing one of communication operation examples based on CSMA/CA according to the present invention.
- FIG. 9 is a view showing one of communication operation examples based on RTS/CTS according to the present invention.
- FIG. 10 is a view showing one of communication operation examples based on RTS/CTS using Shot NAV according to the present invention.
- FIG. 11 is a view showing a communication operation example base on CSMA/CA according to a conventional technology
- FIG. 12 is a view showing a communication operation example based on RTS/CTS according to a conventional technology
- FIG. 13 is a view showing a communication operation example based on CSMA/CA under a communication environment in which conventional stations and high-grade communication stations intermix according to a conventional technology;
- FIG. 14 is a view showing a communication operation example based on RTS/CTS in conformity with the IEEE 802.11g according to a conventional technology
- FIG. 15 is a view showing one example of the internal configuration of a wireless reception unit 110 of a high-grade communication station capable of decoding a SIGNAL-2 portion;
- FIG. 16 is a view showing one example of the frame configuration of a packet transmitted according to the second communication method.
- FIG. 17 is a view showing communication operation sequencing by which a plurality of reception stations replies by a time division response packet to a transmission packet from a transmission station.
- Channels of communication supposed in the present invention are wireless channels, and a network is built among a plurality of communication stations.
- Communication supposed in the present invention is a store and forward type traffic, and information is transferred per packet.
- each communication station is supposed to have a single channel in the following description, it is also possible to expand the description to the case where a transmission medium composed of a plurality of frequency channels, i.e. multi channels, is used.
- each communication station directly (randomly) transmits information in accordance with an access procedure based on a carrier sense multiple access (CSMA) (carrier detection multiple connection), and can build an autonomous distributed type wireless network.
- CSMA carrier sense multiple access
- transmission control using channel resources effectively is performed by means of transmission (MAC) frame in a gentle time division multiplexing access structure.
- each communication station can perform an access system based on a time synchronization such as reserving a frequency band and setting a priority use duration.
- One embodiment of the present invention supposes, for example, a communication environment in which both high-grade communication stations in conformity with the IEEE 802.11g corresponding to a high-speed edition standard using the same band and a conventional station in conformity with the conventional IEEE 802.11b intermixedly operate. That is, there are two kinds of communication terminals, that is; conventional stations which can transmit and receive only the packets modulated according to some limited modulation systems; and high grade communication stations which can receive packets according to a high-grade system in addition to the modulation system by which the conventional station can receive packets.
- the communication system in which the IEEE 802.11g and the IEEE 802.11b, both using the same band, intermix has a problem of coexistence.
- the reason is that, because the conventional station cannot receive a data packet transmitted at a high-speed rate, the conventional station cannot decode the Duration described in a MAC header to raise an NAV suitably, and consequently cannot avoid a collision.
- the present invention solves the coexistence problem by securing that the higher rank standard IEEE 802.11g assures the conventional standard IEEE 802.11b of the so-called upper compatibility. The solving method will be described later.
- FIG. 1 schematically shows a functional configuration of a wireless communication apparatus operating as a communication station in a wireless network according to one embodiment of the present invention.
- a wireless communication apparatus 100 shown here can form a network while avoiding a collision in the same wireless system by performing a channel access effectively.
- the wireless communication apparatus 100 is either of a conventional station in conformity with the IEEE 802.11a/b as a first communication method and a high-grade communication station in conformity with the IEEE 802.11g as a second communication method.
- the wireless communication apparatus 100 is composed of an interface 101 , a data buffer 102 , a central control unit 103 , a packet generation unit 104 , a wireless transmission unit 106 , a timing control unit 107 , an antenna 109 , a wireless reception unit 110 , a packet analysis unit 112 , and an information storage unit 113 .
- the interface 101 performs exchanges of various kinds of information between the wireless communication apparatus 100 and an external apparatus (such as a personal computer, though not shown) connected to the wireless communication apparatus 100 .
- the data buffer 102 is used for temporarily storing the data transmitted from the external apparatus connected to the wireless communication apparatus 100 through the interface 101 , and the data received through a wireless transmission path before transmitting the data through the interface 101 .
- the central control unit 103 unitarily performs the administration of series of information transmission and reception processing in the wireless communication apparatus 100 and the access control of transmission paths. Basically, the central control unit 103 sets a timer of backoff to operate over a random period of time on the basis of CSMA while monitoring the states of the transmission paths, and performs access contention of acquiring a transmission right in the case where no transmission signals exist during this period of time.
- the present embodiment adopts a mechanism of a priority transmission in the access contention to realize flexible QoS (see FIG. 2 ).
- the wireless communication apparatus 100 takes a normal operation mode after a packet transmission of another station or at the time of low traffic priority, and sets an inter frame space IFS to a longer DIFS, and further sets the random backoff.
- the wireless communication apparatus 100 sets the inter frame space IFS to a shorter SIFS, which enables a transmission prior to the other stations performing normal transmission operations.
- the packet generation unit 104 generates a packet signal to be transmitted from the local station to a peripheral station.
- the packet hereupon includes a transmission request packet RTS from a communication station being a reception destination, a confirmation response packet CTS to the transmission request packet RTS, an ACK packet and the like as well as a data packet.
- a data packet is generated by taking out of the transmission data stored in the data buffer 102 for a predetermined length to be set as a payload.
- a MAC frame is configured by adding a MAC header to a payload, and furthermore a PHY header is added at a PHY layer to be a final transmission packet structure.
- the PHY header constitutes a first decoding portion
- the MAC frame portion constitutes a second decoding portion. The configuration of a packet signal will be described later.
- the wireless transmission unit 106 and the wireless reception unit 110 correspond to an RF layer and the PHY layer in the communication protocol.
- the wireless transmission unit 106 performs the wireless transmission processing of a packet signal according to a predetermined modulation system and a transmission rate.
- the wireless transmission unit 106 includes a modulator for modulating a transmission signal according to the predetermined modulation system, a D/A converter for converting a digital transmission signal into an analog signal, an up-converter for performing the frequency conversion of an analog transmission signal to up-convert the analog transmission signal, a power amplifier (PA) for amplifying the electric power of the up-converted transmission signal (all of thorn are not shown).
- the wireless transmission unit 106 performs the wireless transmission processing at a predetermined transmission rate.
- the wireless reception unit 110 performs the wireless reception processing of the packet signal from another station.
- the wireless reception unit 110 is composed of a low noise amplifier (INA) for amplifying the voltage of a wireless signal receiving from another station through the antenna 109 , a down-converter for down-converting the voltage-amplified reception signal by frequency conversion, an automatic gain controller (AGC), an A/D converter for performing the digital conversion of an analog reception signal, a demodulator for performing a synchronous processing for acquiring a synchronization, a channel estimation, a demodulation processing by means of a demodulation system such as OFDM, and the like (all of them are not shown).
- INA low noise amplifier
- AGC automatic gain controller
- A/D converter for performing the digital conversion of an analog reception signal
- demodulator for performing a synchronous processing for acquiring a synchronization
- a channel estimation a demodulation processing by means of a demodulation system such as OFDM, and the like (all of them are not shown).
- the wireless transmission unit 106 and the wireless reception unit 110 respectively perform a transmission and a reception of a packet according to a modulation system and a transmission rate in conformity with a wireless LAN standard.
- the wireless communication apparatus 100 conforms to the IEEE 802.11g as the second communication method, it is possible for the wireless communication apparatus 100 to perform a transmission and reception of a packet according to a modulation system and a transmission rate in conformity with the IEEE 802.11a/b.
- the wireless communication apparatus 100 can perform a transmission and a reception of a packet at a transmission rate inherent to the IEEE 802.11g (i.e.
- the first decoding portion of a packet composed of the PHY header is transmitted and received at a transmission rate capable of being received by the IEEE 802.11a/b, but the second decoding portion composed of the MAC frame is transmitted and received at a transmission rate in conformity with the IEEE 802.11g.
- the antenna 109 performs the wireless transmission of a signal to another wireless communication apparatus on a predetermined frequency channel, or collects a signal transmitted from another wireless communication apparatus.
- the present embodiment is provided with a single antenna, and it is supposed that a transmission and a reception cannot simultaneously performed in parallel.
- the timing control unit 107 controls a timing for transmitting and receiving a wireless signal.
- the timing control unit 107 controls its own packet transmission timing, the transmission timing of each packet (such as RTS, CTS, data, and ACK) in conformity with the RTS/CTS system (setting of an inter frame space IFS and the backoff), the setting of the NAV at the time of reception of a packet addressed to another station, and the like.
- the packet analysis unit 112 analyzes the packet signal which can be received from another station.
- the packet is composed of a first decoding portion and a second decoding portion. The details of a packet decoding method will be described later.
- the information storage unit 113 stores an execution procedure instruction of a series of access control operations to be executed by the central control unit 103 , and information obtained from an analysis result of a reception packet.
- a wireless network of the present embodiment there are two kinds of communication stations of conventional stations capable of the transmission and the reception of a packet modulated according to some limited modulation systems, and high grade communication stations capable of the reception in conformity with a high-grade system in addition to the modulation systems in which the conventional stations can perform receptions.
- high grade communication stations capable of the reception in conformity with a high-grade system in addition to the modulation systems in which the conventional stations can perform receptions.
- the present embodiment solves this problem by making the high-grade communication stations provide the so-called ad-hoc compatibility to the conventional stations. The details of the solution will be described.
- FIG. 3 schematically shows the configuration of a packet which the wireless communication apparatus 100 operating as a communication station in the wireless network of the present embodiment transmits and receives.
- a MAC frame is constituted by adding a MAC header to a payload (corresponding to an IP packet). Moreover, in a PHY layer, a PHY header is added to the MAC frame to be a final transmission packet structure.
- the PHY header constitutes a first decoding portion
- the MAC frame portion constitutes a second decoding portion.
- a packet is composed of a physical layer convergence protocol (PLCP) preamble portion and a SIGNAL portion as the PHY header, and the MAC frame.
- the MAC frame is composed of the MAC header and a data portion.
- PLCP physical layer convergence protocol
- the PHY header corresponds to the first decoding 30 portion, and the MAC frame corresponds to the second decoding portion.
- both of the PHY header and the MAC frame are transmitted according to the first communication method.
- the communication station of a packet is a high-grade communication station in conformity with the IEEE 802.11g
- the communication station transmits the whole packet according to the first communication method when the communication station transmits the packet to a conventional station.
- the transmitting communication station transmits only the first decoding portion of the packet according to the first communication method, by which all communication stations can receive the first decoding portion, and can transmit the second decoding portion of the packet including the data portion according to the second communication method having a higher transmission rate.
- the PLCP preamble portion is transmitted as the head of the packet, and next, the SIGNAL portion and the MAC frame are transmitted.
- the PLOP preamble portion includes elements such as a signal detect (Signal Detect) and a channel estimation (Channel Estimation). Consequently, a peripheral station knows the existence of a signal from a communication station by receiving the PLCP preamble portion, and performs the estimation of a transmission channel and the like.
- a signal detect Signal Detect
- Channel Estimation Channel Estimation
- the communication station knowing the transmission of the signal by the detection of the PLCP preamble portion starts the reception of the subsequently arriving SIGNAL portion. Because the SIGNAL portion is transmitted according to the first communication method, which all communication station know, both of the conventional stations and the high-grade communication stations can receive the SIGNAL portion.
- the SIGNAL portion includes a transmission rate (Rate) of the subsequent MAC frame, the length (Length) of a residual data of the packet such as the MAC frame, parity (Parity), a reserved area (Reserve) and the like.
- the MAC frame is modulated according to the transmission rate specified by the transmission rate (Rate) of the SIGNAL portion.
- the MAC frame is composed of the MAC header and the data portion corresponding to the payload.
- the MAC header describes an address (RX Address) of the reception station of the packet, Duration specifying the duration in which the stations other than the reception station severally should raise the NAV.
- a communication station which can normally receive and decode the MAC header portion compares the address of the local station with the reception address. When they coincide with each other, the communication station receives the residual portion of the packet at a specified rate for the duration of (packet length)/(transmission rate) in accordance with the transmission rate (Rate) and the packet length (Length) information, both described in the SIGNAL portion. Moreover, when its own address and the received address do not coincide with each other, the communication station raises the NAV for the Duration described in the MAC header, and restrains any transmissions from the local station.
- the procedure for securing a band in accordance with the procedure mentioned above is generally called as virtual carrier sense.
- the transmission station transmits only the first decoding portion according to the first communication method, which all communication stations can receive, but transmits the second decoding portion including the data portion according to the second communication method having the higher transmission rate. Consequently, because the conventional stations cannot receive the second decoding portion, the conventional stations cannot decode the Duration described in the MAC header. Consequently, there is a problem in which the conventional stations cannot know the duration for which the conventional stations should severally raise the NAV.
- the description of the Duration in the MAC header has been used for band securing.
- a mechanism is needed for the conventional stations to recognize the duration for which the conventional stations should severally raise the NAV on the basis of other information without using the description of the Duration.
- the present embodiment prepares a mechanism in which, even if a packet is transmitted according to the IEEE 802.11g as the second communication method, the first decoding portion, which all communication stations can certainly receive, is provided, and the duration corresponding to the NAV is specified by means of the first decoding portion.
- the first decoding portion is composed of the PHY header of a packet.
- the period of time corresponding to the Duration is described in a pseudo-way in the SIGNAL portion, which all communication stations can receive, by using the information of the transmission rate (Rate) and the packet length (Length). That is, the information of the transmission rate (Rate) and the packet length (Length) is spoofed so that the value of (packet length)/(rate) may be equal to the duration for which any communications are desired to be stopped.
- the conventional stations severally set the packet length and the transmission rate, which are different from the fact, and perform the reception for a period of time corresponding to the Duration.
- the actual packet is not transmitted over the period of (packet length)/(rate), but the conventional stations do not start their transmissions for the duration corresponding to Duration.
- the conventional stations restrain their transmissions and continue their receiving for the duration for which communications are desired to be stopped.
- the IEEE 802.11 has a rule in which, when a CRC error is generated in the data portion, any receptions are restrained for a period of time EIFS longer than a normal inter frame space DIFS. Accordingly, it is desirable to perform the spoofing so that a period of time obtained by subtracting “EIFS DIFS” from the duration for which the receptions are truly desired to be continued as the period of (packet length)/(rate) for avoiding the conventional station being always unfairly treated.
- the high-grade communication stations use the information of the transmission rate (Rate) and the packet length (Length) so as to describe the period of time corresponding to Duration in the first decoding portion in a pseudo-way, and thereby the high grade communication stations supply the so-called ad-hoc compatibility to the conventional stations.
- the conventional stations avoid any collisions, and thereby a normal network operation can be realized.
- a value which the first communication method can deal with should be set in the transmission rate (Rate) field of the SIGNAL portion as the spoofing in order that the conventional stations can correctly decode the first decoding portion.
- the packet length (Length) should be also spoofed in accordance with the spoofed transmission rate (Rate) value.
- the spoofing is performed in the SIGNAL portion in order that the value of (packet length)/(rate) may be equal to the duration for which the conventional stations are desired to stop communications.
- the duration for which the conventional stations are desired to stop communications indicates the duration until a communication transaction performed according to the second communication method ends.
- the duration indicates the duration until an ACK transmission in a communication procedure performed according to the second communication method ends.
- the above-mentioned duration corresponds to the duration until all of the ACK transmissions performed from each of the remote stations in time division multiplex end.
- Japanese Patent Application No. 2003-297919 which has been assigned to the present applicant, discloses a communication system in which a transmission station transmits a data frame addressed to a plurality of reception stations by means of space division multiple access (SDMA) and each reception station replies ACK in time division multiplex.
- SDMA space division multiple access
- the transmission of the ACK packet hereupon is not limited to the transmission of the ACK packet alone, but includes the case where the ACK packet is multiplexed by the other kinds of packets such as an RTS packet, a CTS packet and a Data packet to be transmitted.
- a high-grade communication station being a communication party to detect that the values of spoofed Rate and Length described in the first decoding portion are spoofed for performing a correct reception operation without performing any malfunctions based on the spoofed Rate and Length. That is, for realizing the mechanism of the ad hoc compatibility in a high-grade communication station, it is needed for each high-grade communication station to recognize that the information of a packet length and a transmission rate described in the first decoding portion is spoofed. Moreover, for preventing the conventional stations from knowing that the information is spoofed, only the high-grade communication stations mutually recognize the fact, and the first communication stations should operate in accordance with the description in the first decoding portion.
- a flag of one bit indicating the existence of the spoofing is prepared in the reserved area (Reserve) of the SIGNAL portion. Then, when a high-grade communication station detect that the information of the packet length and the rate is spoofed by means of the flag in the first decoding portion, the high-grade communication station shifts to the corresponding high grade rate mode, and can decode actual data by receiving the residual packet, i.e. a high-grade decoding portion. In this case, the high grade communication station destroys the information of the packet length and the rate read from the SIGNAL portion of the received packet.
- the shift of the communication method can be specified only by means of the spoofed flag of one bit as described above with FIG. 3 being referred to.
- the second communication method includes a plurality of transmission modes, it becomes impossible to specify a transmission mode only by means of the spoofed flag of one bit.
- FIG. 4 shows a variation of the packet structure shown in FIG. 3 .
- a SIGNAL-2 portion high throughput (HT) PHY portion
- HT high throughput
- the SIGNAL-2 portion includes a field describing a true transmission rate (True Rate) and a true packet length (True Length), and a field describing a mode parameter value (Mode Parameter). Because the SIGNAL-2 portion is transmitted at a fixed transmission rate at which all high-grade communication stations can perform a reception, the high-grade communication station which has received the packet performs an reception operation in accordance with the true transmission rate (True Rate) and the true packet length (True Length). Moreover, conventional stations cannot decode the SIGNAL-2 portion, and set their reception duration on the basis of the rate and the length described in the SIGNAL portion.
- the SIGNAL-2 portion is transmitted at a low transmission rate of about 6 Mbps for all high-grade communication stations can receive the SIGNAL-2 portion, and a modulation processing of the SIGNAL-2 portion is performed according to a modulation system which each of the high-grade communication stations know but the first communication stations do not know. Thereby, only the high-grade communication stations can demodulate the SIGNAL portion to recognize that the SIGNAL portion is spoofed.
- a high-grade communication station receiving the packet tries to decode the SIGNAL-2 portion in accordance with both of the first communication method and a communication method which the first communication stations cannot decode, and can recognize that the SIGNAL portion is spoofed by the fact that the SIGNAL-2 portion can be decoded according to the latter method. Then, the high-grade communication station can perform the reception processing of the second decoding portion according to the communication mode obtained from the SIGNAL-2 portion.
- the SIGNAL-2 portion is located before the MAC frame being the second decoding portion. Consequently, in the case where the information of a packet length and a transmission rate is spoofed in the first decoding portion, a high-grade communication station receiving the packet can perform the reception operation of the second decoding portion after the SIGNAL-2 portion on the basis of the true packet length (True Length) and the true transmission rate (True Rate) describe in the SIGNAL-2 portion.
- a high-grade communication station performing a packet transmission modulates the second communication method decoding portion according to a modulation system known only by each of the high-grade communication stations, and thereby it can be realized that all of the high-grade communication stations can decode the second communication method decoding portion, and that conventional stations cannot decode the second communication method decoding portion.
- a phase modulation of the SIGNAL-2 portion such as BPSK
- a phase difference ⁇ which second communication stations jointly own, may be given to a signal point location, or a signal point may be translated by a known quantity ⁇ d.
- a high-grade communication station receiving the packet performs the phase demodulation of the packet in consideration of the phase shift of the signal point location such as the phase difference ⁇ or the movement quantity ⁇ d. Then, the high-grade communication station can know the spoofing of the first decoding portion by the fact that the SIGNAL-2 portion could be decoded.
- FIG. 16 shows an example of the inner structure of 51 the wireless reception unit 110 in this case.
- the wireless reception unit 110 is composed of an RF unit and a PITY portion.
- the PHY portion is composed of a first demodulation unit, a second demodulation unit, and a reception processing unit for processing reception data which correctly demodulated by either of these demodulation units.
- the reception processing unit notifies the first demodulation unit of the modulation system (transmission rate) obtained from the first decoding portion.
- the first demodulation unit supposes that the first decoding portion is not spoofed, and demodulates the signal after that according to the modulation system (transmission rate) described in the first decoding portion by the signal point location same as that of the first decoding portion.
- the second demodulation unit supposes that the SIGNAL-2 portion follows the first decoding portion, and demodulates the SIGNAL-2 portion according to a known modulation system (transmission rate) by the signal point location whose phase has been rotated by 90 degrees.
- the SIGNAL-2 portion has a fixed length. Consequently, when it becomes clear that the portion is the SIGNAL-2 portion after the demodulation of a predetermined length of the SIGNAL-2 portion, it is found that the first decoding portion is spoofed. If not so, it is found that the first decoding portion is not spoofed. In the latter case, the second demodulation unit continues the demodulate at the unrotated signal point location by the first demodulation unit. Thereby, it is possible to suggest whether the spoofing is performed or not without providing any spoofed flag in the reserved area (Reserve) of the first decoding portion.
- a modulation system for providing a phase difference to a signal point on a constellation to perform mapping is, for example, disclosed in Japanese Unexamined Patent Publication No. Hei 11-146025.
- the high-grade communication station can decode the second decoding portion (see DATA portion of FIG. 16 ) in principle, as described above.
- the second decoding portion cannot be decoded when the distance between communication terminals is large, or when a MIMO communication is performed.
- the value of (packet length)/(transmission rate) calculated on the basis of the description in the SIGNAL portion as the first decoding portion is the duration until the reception of ACK in FIG. 16 is completed.
- the value of (True Length)/(True Rate) calculated on the basis of the I-IT-SIGNAL portion as the second communication method decoding portion corresponds to the duration until the transmission of a true packet is completed.
- the difference between the two (Length)/(Rate) (by adding EIF-DIFS in FIG. 16 ) is a value corresponding to an NAV indicating how long the packet transmission terminal directs the other terminals to restrain their transmissions.
- the method of adding the field (SIGNAL-2 portion or HT-SIGNAL portion) as shown in FIG. 4 for specifying a transmission mode to a packet for enabling the mutual notification of the transmission mode among high-grade communication stations is simple, but the decrease of the overhead and the communication efficiency caused by the transmission data becomes a problem.
- the high-grade communication stations destroy the information of Rate in the SIGNAL portion as being spoofed.
- the example shown in FIG. 4 it is possible to indicate which mode the successive high-grade modulation system takes by using the information of True Rate described in the SIGNAL-2 portion.
- FIG. 5 shows a description example of the Rate field in the IEEE 802.11a.
- the IEEE 802.11a sets eight transmission rates of 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48 Mbps and 54 Mbps.
- transmission rates are expressed by means of four bits.
- a spoofed flag is set, it is possible to assign the definition of the Rate field on a standard to the specifying of an actual high-speed transfer mode.
- the Rate field is four bits, all of the LSB's are set to be 1. Consequently, it is possible to specify each of 3 bits, i.e. eight modes can be specified.
- the IEEE 802.11b being a conventional standard includes the least upper bound of settable packet length (Length). Consequently, when a higher rank rate is used for spooling, the Length field is lacked. Then, there is a problem in which a sufficient value of Duration cannot be secured for (packet length (Length))/(rate (Rate)) (namely, an NAV of a long duration cannot be spoofed).
- the IEEE 802.11n supposes a system using a multi-input multi-output (MIMO) communication and a system expanding a communication use band as a high-speed transmission, a plurality of transmission modes can exist according to the combination of the number of antennas used for the MIMO communications and communication use bands.
- the transmission mode may be notified among the high-grade communication stations by means of any one of the above-described methods.
- the MIMO communication indicates a technique for achieving the increase of a transmission capacity and the improvement of a communication speed by realizing space division multiplexing, i.e. a plurality of logically independent transmission paths, by providing a plurality of antenna elements both at the transmitter side and at the receiver side. Because the MIMO communication uses the space division multiplexing, frequency usability is good.
- FIG. 6 shows a reception processing procedure in the form of a flowchart in the case where the wireless communication apparatus 100 operates as a conventional station. Such a processing procedure is actually realized in a form in which the central control unit 103 executes the instruction executing program stored in the information storage unit 113 .
- the wireless communication apparatus 100 When the wireless communication apparatus 100 receives a PLOP preamble portion in step S 1 , the wireless communication apparatus 100 successively receives the SIGNAL portion of the PHY layer in step S 2 .
- the wireless communication apparatus 100 decodes the information of the transmission rate (Rate) and the packet length (Length) described in the SIGNAL portion in step S 3 , and calculates the reception duration determined by (packet length)/(transmission rate).
- the wireless communication apparatus 100 receives a MAC header portion at the transmission rate specified by RATE in the SIGNAL portion in step S 4 .
- the wireless communication apparatus can decode the reception destination address on the basis of the MAC header in step S 5 .
- the wireless communication apparatus 100 compares the reception destination address with the local station address in step S 6 .
- the wireless communication apparatus 100 performs the reception processing for the packet length specified by the Length of the SIGNAL portion in step S 7 .
- the wireless communication apparatus 100 raises an NAV for the Duration determined by (packet length)/(transmission rate), and restrains its transmission in step S 8 .
- the wireless communication apparatus 100 when the wireless communication apparatus 100 cannot decode the reception destination address on the basis of the MAC header in step S 5 , the wireless communication apparatus 100 performs reception processing for a packet length specified by the Length of the SIGNAL portion in step S 7 .
- FIG. 7 shows a reception processing procedure in the form of a flowchart when the wireless communication apparatus 100 operates as a high-grade communication station.
- a processing procedure is actually realized in the form in which the central control unit 103 executes the instruction executing program stored in the information storage unit 113 .
- the wireless communication apparatus 100 When the wireless communication apparatus 100 receives a PLCP preamble portion in step S 11 , the wireless communication apparatus 100 successively receives the SIGNAL portion of the PHY layer in step S 12 .
- the wireless communication apparatus 100 refers to the spoofed flag in the Reserve field to judge whether the information of the transmission rate (Rate) and the packet length (Length) is spoofed or not in step S 13 .
- the wireless communication apparatus 100 judges whether the SIGNAL-2 portion is provided successively to the SIGNAL portion or not. Thereby, the wireless communication apparatus judges whether the information of the transmission rate (Rate) and the packet length (Length) is spoofed or not in step S 13 . In this case, the wireless communication apparatus 100 tries to demodulate the SIGNAL-2 portion according to the modulation system which each of the high-grade communication stations knows but the first communication stations do not know in parallel with the wireless communication apparatus 100 demodulates the signal after the SIGNAL-2 portion according to the modulation system (transmission rate) described in the SIGNAL portion. Then, the wireless communication apparatus 100 can recognized that the SIGNAL portion is spoofed on the basis of the fact the wireless communication apparatus 100 can decode the SIGNAL-2 portion according to the latter modulation system.
- the wireless communication apparatus 100 receives the MAC header portion at the transmission rate specified by the RATE in the SIGNAL portion in step S 15 .
- the wireless communication apparatus can decode the reception destination address on the basis of the MAC header in step S 16 .
- the wireless communication apparatus 100 compares the reception destination address with the local station address in step S 17 . Then, when both the addresses coincide with each other, the wireless communication apparatus 100 performs the reception processing for the packet length specified by the Length of the SIGNAL portion in step S 18 .
- the wireless communication apparatus 100 raises an NAV for the Duration specified by the MAC header, and restrains its transmission in step S 19 .
- the wireless communication apparatus 100 when the wireless communication apparatus 100 cannot decode the reception destination address on the basis of the MAC header in step S 16 , the wireless communication apparatus 100 performs reception processing for a packet length specified by the Length of the SIGNAL portion in step S 18 .
- the wireless communication apparatus 100 judges that the second decoding portion of the packet is transmitted at the transmission rate at which only the high-grade communication stations can receive the packet on the basis of the setting of the spoofed flag in the SIGNAL portion or on the basis of the provision of the SIGNAL-2 portion in step S 13 , the wireless communication apparatus 100 shills to a high speed transmission mode in step S 20 , and receives the MAC header portion in step S 15 .
- the wireless communication apparatus 100 performs the reception processing according to, for example, True Rate and True Length described in the SIGNAL-2 portion.
- the wireless communication apparatus 100 when the wireless communication apparatus 100 can decode the reception destination address on the basis of the MAC header in step S 16 , the wireless communication apparatus 100 compares the reception destination address with the local station address in step S 17 . Then, when both the addresses coincide with each other, the wireless communication apparatus 100 performs the reception processing for the packet length specified by the Length of the SIGNAL portion in step S 18 .
- the wireless communication apparatus 100 raises an NAV for the Duration determined by (packet length)/(transmission rate), and restrains its transmission in step S 19 .
- FIG. 8 shows a communication operation example based on CSMA/CA.
- the communication station #0 and the communication station #2 are supposed to be high-grade communication stations
- the communication station #2 and the communication station #3 are supposed to be conventional stations.
- Each communication station having transmission data monitors a medium state for a predetermined inter frame space DIFS from the last detection of a packet.
- the communication station performs random backoff.
- a transmission right is given to the communication station.
- the communication station #0 setting the random backoff shorter than that of the other peripheral stations acquires the transmission right, and can start a data transmission to the communication station #1 similarly as a high-grade communication station.
- the transmission source communication station #0 transmits a first decoding portion corresponding to the PHY header according to a first communication method, which all communication stations can receive, and transmits a second decoding portion corresponding to the MAC frame according to a second communication method, which only the high-grade communication stations can receive. Then, the transmission source communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until an ACK packet for which communications are desired to be stopped.
- the transmission source communication station #0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, the transmission source communication station #0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive.
- the transmission source communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped.
- the communication station #2 and the communication station #3 as the conventional stations can hear the SIGNAL portion of the packet from the communication station #0, and set a packet length and a transmission rate different from the actual state to perform reception for a period of time corresponding to the duration until the transmission of the ACK packet ends.
- the data packet from the communication station #0 is not transmitted for a period of (packet length)/(rate), but the communication station #2 and the communication station #3 try to receive the data packet and do not start any transmissions. As a result, the communication stations #2 and #3 restrain their transmissions.
- the rate and the packet length are different from the real transmission of the packet, the rate and the packet cannot be normally decoded, and the communication station #2 and the communication station #3 destroy the packet.
- a spoofed flag indicating the spoofing of the information of the transmission rate (Rate) and the packet length (Length) of the SIGNAL portion is set.
- the communication mode of a MAC frame i.e. the true transmission rate (True Rate) and the true packet length (True Length)
- the spoofing of the information of the transmission rate (Rate) and the packet length (Length) of the SIGNAL portion is indicated, and the true transmission rate (True Rate) and the true packet length (True Length) of the MAC frame are described.
- the communication station #1 being the communication party is a high-grade communication station, and detects the spoofing of the information of a packet length and a rate of a SIGNAL portion on the basis of the spoofed flag. Alternatively, the communication station #1 detects the spoofing of the information of the packet length and the rate of a SIGNAL portion on the basis of the success of the decoding of the SIGNAL-2 portion. Then, the communication station #1 destroys the reception result of the SIGNAL portion in response to the detection of the spoofing.
- the communication station #1 receives the MAC frame as the successive second decoding portion at the transmission rate indicated by the SIGNAL portion or the SIGNAL-2 portion, and performs the reception operation of the data addressed to the local station for the duration of Duration described in the MAC header. Then, when the data reception is completed, the communication station #1 returns an ACK packet to the data transmission source communication station #0.
- FIG. 9 shows a communication operation example based on RTS/CTS.
- the communication station #0 and the communication station #2 are supposed to be high-grade communication stations
- the communication station #2 and the communication station #3 are supposed to be conventional stations.
- Each communication station is in the following communication state. That is, the communication station #2 can communicate with the adjacent communication station #0, and the communication station #0 can communicate with the adjacent communication stations #1 and #2.
- the communication station #1 can communicate with the adjacent communication stations #0 and #3.
- the communication station #3 can communicate with the adjacent communication station #1.
- the communication station #2 is a concealed terminal for the communication station #1
- the communication station #3 is a concealed terminal for the communication station #0.
- Each communication station having transmission data monitors a medium state for a predetermined inter frame space DIFS from the last detection of a packet.
- the communication station performs random backoff.
- a transmission right is given to the communication station.
- the communication station #0 setting the random backoff shorter than that of the other peripheral stations acquires the transmission right, and can start a data transmission to the communication station #1 similarly as a high-grade communication station after the inter frame space DIFS.
- the data transmitting communication station #0 transmits a transmission request packet (RTS) to the communication station #1.
- RTS transmission request packet
- the reception destination communication station #1 returns a confirmation note (CTS) to the communication station #0 after the shorter inter frame space SIFS (Short IFS).
- the communication station #0 transmits a first decoding portion corresponding to the PHY header according to a first communication method, which all communication stations can receive, and transmits a second decoding portion corresponding to the MAC frame according to a second communication method, which only the high-grade communication stations can receive. Then, the transmission source communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until an ACK packet for which communications are desired to be stopped.
- the transmission source communication station #0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, the communication station #0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive.
- the communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped.
- the communication station #2 as a conventional station can hear the SIGNAL portion of the RTS packet from the communication station #0, and set a packet length and a transmission rate different from the actual state to perform a reception operation for a period of time corresponding to (packet length)/(rate).
- the RTS packet from the communication station #0 is not transmitted for a period of (packet length)/(rate), but the communication station #2 tries to receive the data packet and do not start any transmissions.
- the communication station #2 restrains its transmission until the transmission of the ACK packet is completed.
- the rate and the packet length are different from the real transmission of the packet, the rate and the packet cannot be normally decoded, and the communication station #2 destroys the packet to transmitted according to the second communication method after that.
- the reception destination communication station #1 transmits the first decoding portion corresponding to the PHY header according to the first communication method, which all communication station can receive, at the time of a transmission of a CTS packet, and transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the communication station #1 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until the ACK packet for which communications are desired to be stopped.
- the reception destination communication station #1 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system which each high-grade communication station knows but the first communication stations do not know. After that, the reception destination communication station #1 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high grade communication stations can receive.
- the reception destination communication station #1 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped.
- the communication station #3 as the conventional station can hear the SIGNAL portion of the CTS packet from the communication station #1, and sets a packet length and a transmission rate different from the actual state to perform reception for a period of time corresponding to the duration until the transmission of the ACK packet ends.
- the CTS packet from the communication station #1 is not transmitted for a period of (packet length)/(rate), but the communication station #3 tries to receive the CTS packet and do not start any transmissions. As a result, the communication station #3 restrains its transmission until the completion of the transmission of the ACK packet.
- the rate and the packet length are different from the real transmission of the packet, the rate and the packet length cannot be normally decoded, and the communication station #3 destroy the packet to be transmitted after that according to the second communication method.
- the communication station #0 starts the transmission of a data packet in response to the reception of the CTS packet after the inter frame space SIPS.
- the transmission source communication station #0 transmits the first decoding portion corresponding to the PHY header according to the first communication method, which all communication stations can receive, and also transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the transmission source communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header, and sets a spoofed flag indicating the spoofing.
- the transmission source communication station #0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, the transmission source communication station #0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive.
- the transmission source communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped.
- the communication station #1 detects the spoofing of the information of a packet length and a rate of a SIGNAL portion on the basis of the spoofed flag. Alternatively, the communication station #1 detects the spoofing of the information of the packet length and the rate of the SIGNAL portion on the basis of the success of the decoding of a SIGNAL-2 portion. Then, the communication station #1 destroys the reception result of the SIGNAL portion in response to the detection of the spoofing. Furthermore, the communication station #1 receives the MAC frame as the successive second decoding portion at the transmission rate indicated by the SIGNAL portion or the SIGNAL-2 portion, and performs the reception operation of the data addressed to the local station for the duration of Duration described in the MAC header. Then, when the reception of the data packet from the communication station #0 is completed, the communication station #1 returns an ACK packet to the data transmission source communication station #0 after the inter frame space SIFS.
- the concealed terminal when a concealed terminal receives at least one of the RTS and the CTS, the concealed terminal sets a transmission stop duration of the local station for the duration in which the data transmission based on the RTS/CTS procedure is expected to be performed, and thereby collisions can be avoided.
- each packet of the RTS, the CTS and data secures only the end of the next packet as the Duration.
- the RTS packet is secured until the end of the CTS packet; the CTS packet is secured until the end of the data packet; the data packet is secured until the end of the ACK packet severally as the Duration. Consequently, even if the RTS/CTS procedure is broken halfway, the peripheral stations are not required to wait until the last.
- FIG. 10 shows a communication operation example based on the RTS/CTS using the Short NAV. Incidentally, in the shown example, a communication environment similar to one shown in FIG. 9 is supposed.
- Each communication station having transmission data monitors a medium state for a predetermined inter frame space DIFS from the last detection of a packet.
- the communication station performs random backoff. Furthermore, when there are no transmission signals also in this period, a transmission right is given to the communication station.
- the communication station #0 which has the random backoff set to be shorter than that of the other peripheral stations, acquires the transmission right to be able to start a data transmission to the communication station #1.
- the communication station #0 which transmits data, transmits a transmission request packet (RTS) to the communication station #1.
- RTS transmission request packet
- the communication station #1 being the reception destination returns a confirmation note (CTS) to the communication station #0 after a shorter inter frame space Short IFS (SIFS).
- the communication station #0 transmits a first decoding portion corresponding to the PHY header according to a first communication method, which all communication stations can receive, and transmits a second decoding portion corresponding to the MAC frame according to a second communication method, which only the high-grade communication stations can receive. Then, the transmission source communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until an CTS packet.
- the transmission source communication station #0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know.
- the communication station #0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive.
- the communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration for which communications are desired to be stopped.
- the communication station #2 as a conventional station can hear the SIGNAL portion of the RTS packet from the communication station #0, and set a packet length and a transmission rate different from the actual state to perform a reception operation for a period of time corresponding to (packet length)/(rate).
- the RTS packet from the communication station #0 is not transmitted for a period of (packet length)/(rate), but the communication station #2 tries to receive the data packet and do not start any transmissions.
- the communication station #2 restrains its transmission until the transmission of the CTS packet is completed.
- the rate and the packet length are different from the real transmission of the packet, the rate and the packet cannot be normally decoded, and the communication station #2 destroys the packet to transmitted according to the second communication method after that.
- the reception destination communication station #1 transmits the first decoding portion corresponding to the PHY header according to the first communication method, which all communication station can receive, at the time of a transmission of a CTS packet, and transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the communication station #1 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until the data packet.
- the reception destination communication station ill transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system which each high-grade communication station knows but the first communication stations do not know.
- the reception destination communication station #1 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive.
- the reception destination communication station #1 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the data packet for which communications are desired to be stopped.
- the communication station #3 as the conventional station can hear the SIGNAL portion of the CTS packet from the communication station #1, and sets a packet length and a transmission rate different from the actual state to perform reception for a period of time corresponding to (packet length)/(rate).
- the CTS packet from the communication station #1 is not transmitted for a period of (packet length)/(rate), but the communication station #3 tries to receive the CTS packet and do not start any transmissions.
- the communication station #3 restrains its transmission until the completion of the transmission of the data packet.
- the rate and the packet length are different from the real transmission of the packet, the rate and the packet length cannot be normally decoded, and the communication station #3 destroy the packet to be transmitted after that according to the second communication method.
- the communication station #0 starts the transmission of a data packet in response to the reception of the CTS packet after the inter frame space SIFS.
- the transmission source communication station #0 transmits the first decoding portion corresponding to the PHY header according to the first communication method, which all communication stations can receive, and also transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the transmission source communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration of Duration until the ACK packet, and sets a spoofed flag indicating the spoofing.
- the transmission source communication station #0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, the transmission source communication station #0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive.
- the transmission source communication station #0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped.
- the communication station #2 as a conventional station can hear the SIGNAL portion of the RTS packet from the communication station #0, and set a packet length and a transmission rate different from the actual state to perform a reception operation for a period of time corresponding to (packet length)/(rate).
- the data packet from the communication station #0 is not transmitted for a period of (packet length)/(rate), but the communication station #2 tries to receive the data packet and do not start any transmissions.
- the communication station #2 restrains its transmission until the transmission of the ACK packet is completed.
- the rate and the packet length are different from the real transmission of the packet, the rate and the packet cannot be normally decoded, and the communication station #2 destroys the packet to transmitted according to the second communication method after that.
- the communication station #1 When the communication station #1 detects the spoofing of the information of the packet length and the rate of a SIGNAL portion on the basis of the spoofed flag, the communication station #1 destroys the information. Furthermore, the communication station #1 receives the MAC frame as the successive second decoding portion at the corresponding transmission rate, and performs the reception operation of the data addressed to the local station for the duration of Duration described in the MAC header. Then, when the reception of the data packet from the communication station #0 is completed, the communication station #1 returns an ACK packet to the data transmission source communication station #0 after the inter frame space SIFS.
- the concealed terminal when a concealed terminal receives at least one of the RTS and the CTS, the concealed terminal sets a transmission stop duration of the local station for the duration in which the transmission of the next packet is expected to be completed, and thereby collisions can be avoided.
- the high-grade communication stations perform the spoofing of the description of the SIGNAL portion of the PHY header, and provide the transmission stop duration to the conventional stations until a transaction according to the high-grade communication method ends to obtain compatibility. That is, the conventional stations unable to deal with the high-grade communication method stop their transmissions for the duration in which the transmission of the next packet is expected to end, and thereby collisions can be avoided.
- the spoofing of the description of the SIGNAL portion is performed in order that the conventional stations may stop their transmission operations for the duration until the ACK transmission ends.
- the ACK response packet
- the above mentioned mechanism can be applied.
- the transmission of the ACK packet hereupon is not limited to the case of single ACK packet, but includes, for example, the case where the ACK packet is multiplexed with other kinds of packets such as an RTS packet, a CTS packet and data packet to be transmitted.
- FIG. 17 shows communication operation sequencing in which a plurality of reception stations replies by a response packet in time division to a transmission packet from a transmission station.
- a packet #0 transmitted from the communication station #0 is supposed to request a reply from the communication station #1 and the communication station #2 severally.
- the packet #0 notifies the communication station #1 and the communication station #2 of the timing of the transmissions of their response packets lest the response packets should collide.
- the value of (packet length)/(rate) of the SIGNAL portion of the packet #0 is set to be the time when the receptions of all response packets have been completed. Thereby, it is prevented that the communication station #3 locating at a position distant from the communication station #1 and communication station #2 to the degree of unable to receiving the response packets from the communication stations #1 and #2 disturbs the responses. Because the SIGNAL portion is transmitted at the lowest rate, such setting is effective to eliminate such a concealed terminal.
- Japanese Patent Application No. 2003297919 which has been assigned to the present applicant already, discloses a communication system in which a transmission station transmits a data frame addressed to a plurality of reception stations in the space division multiple access (SDMA) and each reception station reply by ACK in the time division multiplex.
- SDMA space division multiple access
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Quality & Reliability (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This application is a continuation of and is based upon and claims the benefit of priority under 35 U.S.C. §120 of U.S. Ser. No. 13/891,570, filed May 10, 2013, which is a continuation of U.S. Ser. No. 13/489,036, filed Jun. 5, 2012, now U.S. Pat. No. 8,467,410 issued Jun. 18, 2013, which is a continuation of U.S. Ser. No. 12/769,432, filed Apr. 28, 2010, now U.S. Pat. No. 8,228,941, issued Jul. 24, 2012, which is a continuation of U.S. Ser. No. 12/426,478, filed Apr. 20, 2009, now U.S. Pat. No. 7,768,985, issued Aug. 3, 2010, which is a continuation of U.S. Ser. No. 10/910,646 filed Aug. 4, 2004, now U.S. Pat. No. 7,542,453, issued Jun. 2, 2009, and claims the benefit of priority under 35 U.S.C. §119 from Japanese Patent Application No. 2004-003530, filed Jan. 8, 2004, the entire contents of each which are incorporated herein by reference.
- 1. Field of the Invention
- The present invention relates to a wireless communication system, a wireless communication apparatus, a wireless communication method, and a computer program for performing mutual communication among a plurality of wireless stations like a wireless local area network (LAN). In particular, the present invention relates to a wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program in which each communication station performs random access on the basis of carrier detection in accordance with the carrier sense multiple access with collision avoidance (CSMA) system.
- To be more precise, the present invention relates to a wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program for realizing random access in a communication environment in which a plurality of communication modes each having a transmission rate different from each other is intermixed. In particular, the present invention relates to a wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program for realizing random access with a smaller overhead under a communication environment in which a plurality of communication modes each having a transmission rate different from each other is intermixed.
- 2. Description of the Related Art
- By setting up a LAN by connecting a plurality of computers to each other, the sharing of information such as a file and data, and the sharing of peripheral equipment such as a printer can be achieved, and further the exchange of information such as the transfer of electronic mail, data, contents and the like can be preformed.
- Conventionally, a wired LAN connection using an optical fiber, a coaxial cable or a twisted-pair cable has been generally used. In this case, line construction work is needed, and it is difficult to set up a network easily. Furthermore, the laying of a cable is troublesome. In addition, after setting up a LAN, because the moving range of an apparatus is limited by the length of a cable, the wired LAN is inconvenient.
- Accordingly, a wireless LAN is noticed as a system for releasing a user from LAN wiring of the wired system. Because almost all of wiring cables can be omitted in a work space such as an office in case of the wireless LAN, communication terminals such as personal computers (PC's) can be relatively easily moved.
- In recent years, as the wireless LAN system has become high in speed and low in cost, the demand of the wireless LAN has been remarkably increased. In particularly, in the most recent days, for performing information communication among a plurality of electronic apparatus existing around a person by setting up a small-scale wireless network among them, the introduction of a personal area network (PAN) has been examined. For example, different wireless communication systems using frequency bands such as a 2.4 GHz band and a 5 GHz band which are not required to be licensed by the competent authorities to use have been defined.
- As normal standards with regard to the wireless network, Institute of Electrical and Electronics Engineers (IEEE) 802.11 (see, for example, Non-Patent Document 1), High Performance Wireless Local Area Network (HIPERLAN)/2 (see, for example, Non-Patent
Document 2 or Non-Patent Document 3), IEEE 802.15.3, Bluetooth communication and the like can be cited. The IEEE 802.11 standard includes various wireless communication systems such as an IEEE 802.11a standard and an IEEE 802.11b standard according to the differences of a wireless communication system, a frequency band to be used, and the like. - A method of providing an apparatus to be a control station called as an “access point” or a “coordinator” in an area to form a network under the generalized control by the control station for constituting a local area network by means of a wireless technique is generally used.
- A wireless network locating an access point therein widely adopts an access control method based on a band reservation, in which when a certain communication apparatus performs an information transmission, the communication apparatus first reserves a band necessary for the information transmission at an access point for using a transmission path in order not to generate any collisions with the information transmission of another communication apparatus. That is, the wireless network performs a synchronized wireless communication in which each communication apparatus in the wireless network is synchronized with each other by locating the access point.
- However, there is a problem in which the usability of a transmission path is reduced to half when an asynchronous communication is performed between communication apparatus on a transmission side and a reception side in a wireless communication system locating an access point therein because the wireless communication through the access point is certainly necessary.
- On the other hand, as an another method for constituting a wireless network, an “ad-hoc communication” in which terminals are directly perform wireless communications with each other asynchronously has been devised. In particular, in a small-scale wireless network composed of a relatively few clients positioned near to each other, the ad-hoc communication, by which arbitrary terminals can directly perform asynchronous wireless communications with each other without using a specific access point, is considered to be suitable.
- Because there is no central control station in an ad-hoc type wireless communication system, the system is suitable for constituting, for example, a home network composed of household electric apparatus. An ad-hoc network has the following features. That is, even if a terminal is in trouble or the power source thereof is off, a routing can be automatically changed, and consequently the network is difficult to break. Also, data can be transmitted relatively long distance while keeping a high-speed data rate by making a packet hop a plurality of times between mobile stations. Many development examples with regard to the ad-hoc system are known (see, for example, Non-Patent Document 4).
- For example, in an IEEE 802.11 series wireless LAN system, an ad-hoc mode in which terminals operate in an autonomous distributed way in peer to peer without locating any control station is prepared.
- Hereupon, it is necessary to avoid contention when a plurality of users accesses the same channel. As a typical communication procedure for avoiding the contention, carrier sense multiple access with collision avoidance (CSMA) is known. The CSMA indicates a connection method of performing multiple access on the basis of carrier detection. Because it is difficult to receive a signal which a terminal itself has performed an information transmission thereof in a wireless communication, a terminal starts own information transmission after confirming the nonexistence of information transmissions of the other communication apparatus not by a CSMA/collision detection (CD) method but by a CSMA/collision avoidance (CA) method for avoiding any collisions.
- A communication method based on the CSMA/CA is described with reference to
FIG. 11 . In the example shown in the drawing, it is supposed that there are fourcommunication stations # 0 to #3 under a certain communication environment. - Each communication station having transmission data monitors a medium state for a predetermined inter frame space, or a distributed coordination function (DCF) inter frame space (DIFS), from the last detection of a packet. When any media are clear, namely when there are no transmission signals, the communication station performs random backoff. Furthermore, when there are no transmission signals also in this period, a transmission right is given to the communication station.
- In the shown example, after monitoring the medium state for an inter frame space DIFS, the
communication station # 0, which has the random backoff set to be shorter than that of the other peripheral stations, acquires the transmission right to be able to start a data transmission to thecommunication station # 1. - At the data transmission, the
communication station # 0, or the transmission source, stores the information for a network allocation vector (NAV), and describes a period of time until the completion of the transaction of a data communication in a duration field of the header of a MAC frame (MAC header). - The
communication station # 1, or the transmission destination of the data frame, performs a reception operation of the data addressed to the local station for the duration of the Duration described in the MAC header. When the data reception has been completed, thecommunication station # 1 returns an ACK packet to thecommunication station # 0, or the data transmission source. - Moreover, the
communication stations # 2 and #3, which have received the data frame, and which are not the data transmission destinations, decode the description in the Duration field of the MAC header, and recognize the state in which the medium is occupied without monitoring the medium until the transaction ends to stop the transmission. The work is called that the peripheral stations “raise a NAV”, or the like. The NAV is effective over the duration indicated in the Duration field. For example, the duration until thecommunication station # 1, or the reception destination, will return the ACK packet is specified as the Duration. - In such a way, according to the CSMA/CA system, contention is avoided while a single communication station acquires a transmission right, and while peripheral stations stop their data transmission operations during the duration of the data communication operation, and thereby collisions can be avoided.
- Hereupon, it is known that a concealed terminal problem is generated in a wireless LAN network in an ad hoc environment. The concealed terminal indicates a communication station which a communication station on one side of a communication party can hear but a communication station on the other side of the communication party cannot hear in case of performing a communication between certain specific communication stations. Because no negotiations can be performed between concealed terminals, there is the possibility that transmission operations collide with each other only by the above-mentioned CSMA/CA system.
- A CSMA/CA in accordance with an RTS/CTS procedure is known as a methodology for solving the concealed terminal problem. Also in the IEEE 802.11, the methodology is adopted.
- In an RTS/CTS system, a data transmission source communication station transmits a transmission request packet Request To Send (RTS), and starts a data transmission in response to the reception of a confirmation note packet Clear To Send (CTS) from a data transmission destination communication station. Then, when a concealed terminal receives at least one of the RTS and the CTS, the concealed terminal sets a transmission stop duration of the local station for the duration in which the data transmission based on the RTS/CTS procedure is expected to be performed, and thereby collisions can be avoided. The concealed terminal for a transmission station receives the CTS to set a transmission stop duration for avoiding the collision with a data packet. The concealed terminal for a reception station receives the RTS to stop the transmission duration for avoiding the collision with the ACK.
-
FIG. 12 shows an operation example of the RTS/CTS procedure. Incidentally, it is supposed that there are fourcommunication stations # 0 to #3 in the communication environment of the wireless communication environment. Thecommunication stations # 0 to #3 are supposed to be in the following state. That is, thecommunication station # 2 can communicate with the adjacentcommunication station # 0. Thecommunication station # 0 can communicate with the adjacentcommunication stations # 1 and #2. Thecommunication station # 1 can communicate with the adjacentcommunication stations # 0 and #3. Thecommunication station # 3 can communicate with the adjacentcommunication station # 1. However, thecommunication station # 2 is a concealed terminal for thecommunication station # 1, and thecommunication station # 3 is a concealed terminal for thecommunication station # 0. - Each communication station having transmission data monitors a medium state for a predetermined inter frame space DIFS (DCF Inter Frame Space) until the communication station has detected a packet last. When the medium is clear, namely when the there are no transmission signals, during this period of time, the communication station performs random backoff. Moreover, when there are no transmission signals also during this period of time, the communication station is given a transmission right.
- In the example shown in the drawing, the
communication station # 0, which has set the random backoff shorter than that of the other peripheral stations after the monitoring of the medium state for the inter frame space DIFS, can acquire the transmission right to start the data transmission to thecommunication station # 1. - That is, the
communication station # 0, which transmits data, transmits a transmission request packet (RTS) to thecommunication station # 1. On the other hand, thecommunication station # 1 being the reception destination returns a confirmation note (CTS) to thecommunication station # 0 after a shorter inter frame space Short IFS (SIFS). Then, thecommunication station # 0 responds to the reception of the CTS packet to start the transmission of a data packet after the inter frame space SIFS. Moreover, when thecommunication station # 1 completes the reception of the data packet, thecommunication station # 1 returns an ACK packet with an inter frame space SIFS put between. Because the inter frame space SIFS is shorter than the inter frame space DIFS, thecommunication station # 1 can transmit the CTS packet before the other stations, which acquires the transmission right after waiting for DIFS+random backoff in accordance with a CMSA/CA procedure. - At this time, the
communication station # 2 and thecommunication station # 3, both located at positions where both of them can be concealed terminals from both of thecommunication station # 0 and thecommunication station # 1, performs control to detect the use of a transmission path by the reception of the RTS or the CTS, and not to perform any transmissions until the communication ends. - To put it more specific, the
communication station # 2 detects the start of the data transmission of thecommunication station # 1 as the transmission source on the basis of an RTS packet, and decodes the Duration field described in the MAC header of the RTS packet, and further recognizes that the transmission path has been already used after that for the duration until the successive transmission of the data packet is completed (the duration until the end of ACK). Thereby, thecommunication station # 2 can raise a NAV. - Moreover, the
communication station # 3 detects the 25 start of the data transmission of thecommunication station # 1 as the reception destination on the basis of the CTS packet, and decodes the Duration field described in the MAC header of the CTS packet, and further recognizes that the transmission path has been already used after that during the duration until the transmission of the successive data packet is completed (the duration until the ACK had ended). Thereby, thecommunication station # 3 can raise a NAV. - In such a way, when a concealed terminal receives at least one of the RTS and the CTS, the concealed terminal sets the transmission stop duration of the local station for the duration to be expected to perform the data transmission based on the RTS/CTS procedure. Consequently, collisions can be avoided.
- Now, the standardization of the IEEE 802.11g for supporting higher speed communication rate as a higher rank standard of the IEEE 802.11b being a wireless LAN specification using 2.4 GHz band has been advanced. A communication station in accordance with the IEEE 802.11g (hereinafter also referred to “high-grade communication station” simply) can also operate in accordance with the IEEE 802.11b, and can transmit a data packet also at a high-speed rate at which a conventional communication station in accordance with the IEEE 802.11b (hereinafter also referred to as “conventional station” simply) cannot perform any reception.
- Hereupon, there is a problem of the coexistence of different communication systems, or a problem of the coexistence of the IEEE 802.11g and the IEEE 802.11b, both using the same band. That is, because the conventional station cannot receive a data packet to be transmitted at a high-speed rate, the conventional station cannot decode the Duration described in the MAC header, and cannot raise a NAV appropriately. Consequently, the conventional station cannot avoid collisions.
- For example, in the example shown in
FIG. 11 , thecommunication station # 0 and thecommunication station # 1, both being communication parties, can exchange a data packet at a high-speed rate in conformity with IEEE 802.11g. On the other hand, when thecommunication station # 2 and thecommunication station # 3 around thecommunication station # 0 and thecommunication station # 1 are conventional stations which do not conform to the IEEE 802.11g, thecommunication stations # 2 and #3 cannot decode the Duration described in the MAC header as a result of being unable to receive the data packet. Consequently, there is the possibility that thecommunication stations # 2 and #3 start their communication operation even in the duration of the Duration to generate a collision (secFIG. 13 ). - The present inventors consider that the problem of the coexistence of the IEEE 802.11g and the IEEE 802.11b is preferably solved by the setting of the IEEE 802.11g, being a higher rank standard, to assure ad-hoc compatibility.
- For example, a method of performing the exchange of an RTS/CTS packet at a transmission rate at which a conventional station can receive the RTS/CTS packet before the transmission of a data packet in IEEE 802.11g can be considered (see
FIG. 14 ). In this case, peripheral conventional stations decodes the Duration field described in the MAC header of the RTS/CTS packet, and recognize that the transmission path has already used for the duration until the completion of the transmission of the successive data packet after that (the duration until ACK ends). Thereby, the peripheral conventional stations can raise an NAV only for suitable duration. That is, the conventional stations cannot hear a data packet to be transmitted at a high-speed rate, but that turns to be no problem for avoiding a collision. - A procedure for securing a band in accordance with the above-mentioned procedure before the transmission of a data packet is generally called a virtual carrier sense.
- However, in such a band securing procedure, the transmission of a data packet cannot be performed without performing the RTS/CTS procedure certainly not only in the case where the concealed terminal problem is generated, but also in the case where the concealed terminal problem does not exist. That is, the faster the transmission rate becomes, the larger the problem of an RTS/CTS overhead becomes. Also, the communication efficiency decreases by the degree of the problem.
- Non-Patent Document 1: International Standard ISO/IEC 8802-11: 1999(E) ANSI/IEEE Std. 802.11, 1999 Edition, Part 11: Wireless LAN Medium Access Control (MAC) and PHYsical Layer (PHY) Specifications.
- Non-Patent Document 2: ETSI
Standard ETSI TS 101 761-1 Vl. 3.1 Broadband Wireless Access Networks (BRAN);HIPERLAN Type 2; Data Link Control (DLC) Layer; Part 1: Basic Data Transport Functions. - Non-Patent Document 3:
ETSI TS 101 761-2 Vl. 3.1 Broadband Wireless Access Networks (BRAN);HIPERLAN Type 2; Data Link Control (DLC) Layer; Part 2: Wireless Link Control (RLC) sublayer. - Non-Patent Document 4: C. K. Tho, “Ad-Hoc Mobile Wireless Network” (Prentice Hall PTR Corp.).
- It is an object of the present invention to provide a superior wireless communication system, a wireless communication apparatus, a wireless communication method, and a computer program in which each communication station can suitably perform random access by the CSMA system on the basis of carrier detection.
- It is another object of the present invention to provide a superior wireless communication system, a wireless communication apparatus, a wireless communication method, and a computer program which can realize random access in a communication environment in which a plurality of communication modes each having a different transmission rate to each other intermixes.
- It is a further object of the present invention to provide a superior wireless communication system, a wireless communication apparatus, a wireless communication method, and a computer program which can realize random access with a smaller overhead in a communication environment in which a plurality of communication modes each having a different transmission rates to each other intermixes.
- The present invention was made in consideration of the above-mentioned problems. A first aspect of the present invention is a wireless communication system in which a first communication station operating according to a first communication method and a second communication station capable of operating according to both of the first communication method and a second communication method coexist, wherein the second communication station transmits a packet composed of a first decoding portion capable of being received according to the first communication method, and a second decoding portion capable of being received according to the second communication method.
- In this case, the “system” hereupon indicates a matter made of a plurality of logically aggregate apparatus (or logically aggregate functional modules realizing specific functions), and it does not matter whether each of the apparatus or the functional modules is in a single housing or not.
- Moreover, the first communication method hereupon corresponds to, for example, the IEEE 802.11b being a wireless LAN specification using a 2.4 GHz band, and the second communication method corresponds to the IEEE 802.11g supporting a high-speed communication rate as a higher rank standard of the IEEE 802.11b.
- Under such communication environment, there is a problem of the coexistence of the IEEE 802.11g and the IEEE 802.11b, both using the same frequency band.
- For example, when a transmission and a reception of a packet is performed by random access, for example, the local station transmits a data packet as a data transmission station, and hopes that peripheral stations stop their communication operations for expected duration until an ACK is returned from a reception station. Moreover, when the RTS/CTS procedure is adopted, for example, the local station transmits an RTS or a CTS packet, and hopes that the peripheral stations stop their communication operations for the expected duration until the ACK is returned. However, when the second communication station operating in accordance with the higher rank standard performs a packet transmission according to the second communication method, a conventional station cannot receive the data packet transmitted at a high-speed rate, and cannot decode a duration described in a MAC header. Then, the conventional station cannot raise a NAV suitably, and cannot avoid a collision.
- In the wireless communication system according to the present invention, a packet is composed of a first decoding portion capable of being received according to a first communication method, and a second decoding portion capable of being received according to a second communication method. The first decoding portion includes information related to a packet length and a transmission rate of the packet. Further, the first communication station that receives the packet calculates (packet length)/(transmission rate) on the basis of the packet length and the transmission rate of the packet, both capable of being obtained by decoding the first decoding portion, in order to obtain a residual reception period of time of the packet.
- Then, when the second communication station performs a communication procedure according to the second communication method, the second communication station describes spoofed information of a packet length and a transmission rate in the first decoding portion like the indication of the duration for which communication operations of the other stations are stopped by (packet length)/(transmission rate) for the sake of the communication procedure. In such a case, the first communication station cannot receive the second decoding portion of the packet, but can avoid a collision by calculating the (packet length)/(transmission rate) on the basis of the description in the first decoding portion to raise the NAV for desired duration, and by stopping any data transmissions.
- That is, in the wireless communication system according to the present invention, the second communication station performing a packet transmission spoofs about the information of the packet length and the transmission rate to be described in the first decoding portion in order that the first communication station receiving the packet may stop its communication operation for the duration until a communication transaction to be performed according to the second communication method ends. Thereby, the second communication station performing the second communication method realizes the so-called upper compatibility to the first communication station.
- The duration until the communication transaction ends hereupon, specifically indicates the duration until an ACK transmission ends in a communication procedure performed according to the second communication method. Moreover, when a packet transmission is performed in accordance with a communication procedure to perform multiple connections with a plurality of communication stations in the second decoding portion, the duration hereupon indicates the duration until all of the ACK transmissions performed in a time division multiplex from each remote station end. Moreover, the transmission of the ACK packet hereupon is not limited to the case of single ACK packet, but includes, for example, the case where the ACK packet is multiplexed with other kinds of packets such as an RTS packet, a CTS packet, and data packet to be transmitted.
- For the second communication station described above realizes the mechanism of the ad-hoc compatibility, it is necessary for each second communication station to recognize that the information of the packet length and the transmission rate described in the first decoding portion is spoofed. Moreover, it is necessary that each second communication station mutually recognizes the spoofing of the information while the first communication station cannot know the spoofing of the information to operate in accordance with the description in the first decoding portion.
- Accordingly, in the wireless communication system according to the present invention, the second communication station performing a packet transmission describes whether the spoofed information of a packet length and a transmission rate is described in the first decoding portion or not in a packet in a format which the second communication station capable of operating according to the second communication method can decode the spoofed information but the first communication station operating according to the first communication method cannot decode the spoofed information.
- For example, the second communication station performing a packet transmission indicates whether the spoofed information of the packet length and the transmission rate is described or not by means of a spoofed flag in the first decoding portion.
- In this case, when the second communication station being a data reception side detects that the information of the packet length and the transmission rate in the first decoding portion of a packet received from another station is spoofed, the second communication station switches its reception method to the second communication method, and can perform the reception operation of the residual portion of the packet.
- Moreover, the second communication station performing a packet transmission may be provided with a known second communication method decoding portion, in which all of the second communication stations can decode data, in a packet, and may describe whether spoofed information of a packet length and a transmission rate is described or not in the second communication method decoding portion for notifying the other second communication stations of the spoofing. For example, when a plurality of communication modes each having a transmission rate different from each other is defined as the second communication method, an actually used communication mode may be described in the second communication method decoding portion.
- It is preferable that a second communication station performing a packet transmission transmits the second communication method decoding portion in a communication method in which all of the second communication stations can decode the data in the second communication method decoding portion but the first communication stations cannot decode the data. For example, the second communication station performing the packet transmission transmits the second communication method decoding portion at a low transmission rate of about 6 Mbps in order that all of the second communication stations can receive, but the second communication station performing the packet transmission performs the modulation processing of the second communication method decoding portion in accordance with a modulation system which each of the second communication stations knows but the first communication stations do not know. Thereby, only the second communication stations can demodulate the second communication method decoding portion to recognize that the first decoding portion is spoofed.
- In such a case, a second communication station receiving the packet tries to decode the second communication method decoding portion by means of both of the first communication method and the communication method by which the first communication station cannot decode the second communication method decoding portion, and the second communication station can recognize that the first decoding portion is spoofed by the fact that the second communication method decoding portion can be decoded according to the latter method. Then, the second communication station can performs the reception processing of the second decoding portion in accordance with the communication mode obtained from the second communication method decoding portion.
- For example, the second communication station locates the second communication method decoding portion before the second decoding portion in a packet. Then, when the second communication station describes the spoofed information of a packet length and a transmission rate for the first communication stations in the first decoding portion, the second communication station describes the information related to an actual packet length and a transmission rate in the second decoding portion in the second communication method decoding portion. In such a case, a second communication station receiving the packet can perform the reception operation of the second decoding portion after the second communication method decoding portion of the received packet on the basis of the information related to the packet length and the transmission rate described in the second communication method decoding portion.
- A second communication station performing a packet transmission can make data to be able to be decoded by all of the second communication stations and to be unable to be decoded by the first communication stations by modulating the second communication method decoding portion in accordance with a modulation system which only each of the second communication station knows. For example, when the second communication station performs a phase modulation such as BASK to the second communication method decoding portion, the second communication station may give a phase difference θ, which is jointly owned by the second communication station, to the location of a signal point (−1, 1), or may translation the signal point by the known quantity Δd. On the other hand, a second communication station receiving the packet performs phase demodulation in consideration of the phase shifts of the location of the signal point such as the phase difference −θ, the movement quantity −Δd and the like. Then, it can be known that the first decoding portion is spoofed by the fact that the second communication method decoding portion can be decoded.
- Incidentally, in the case where a second communication station capable of operating according to the second communication method is located at a position far from a transmission source, a situation in which the second communication station can receive a second communication method decoding portion, which is transmitted at a low transmission rate, but cannot receive the second decoding portion, which is transmitted at a high-speed transmission rate, owing to an S/N, can be also supposed. In such a case, a second communication station receiving a packet tries to perform the reception operation of a second decoding portion on the basis of the information related to a packet length and a transmission rate described in the second communication method decoding portion of the received packet. When the second communication station cannot decode the second decoding portion, the second communication station may obtain a difference between a period of time (i.e. (packet length)/(transmission rate)) obtained from the spoofed packet length and the transmission rate described in the first decoding portion and a period of time (i.e. (packet length)/(transmission rate)) obtained from the packet and the transmission rate described in the second communication method decoding portion, and may restrain the transmission of a packet for a predetermined period of time.
- The wireless communication system according to the present invention supposes, for example, a communication environment in which a conventional station operating in accordance with the IEEE 802.11b and a high-grade communication station operating in conformity with the IEEE 802.11g corresponding to a high-speed edition standard using the same band intermixedly operate.
- In the wireless communication system according to the present invention, a packet to be transmitted is composed of a known fixed rate portion (hereinafter also referred to as “general decoding portion”) which all of the communication stations can decode, and an arbitrary rate portion (hereinafter also referred to as “high-grade decoding portion”) which possibly only a part of the communication station being at a high-grade can decode.
- The general decoding portion of a packet generally describes a residual length of the packet and a rate at which residual packets are transmitted therein. Consequently, a communication station receiving the packet tries to receive the residual part of the packet by performing the reception operation of the packet at a specified rate for the duration of (packet length)/(rate).
- In the present invention, a high-grade communication station performs a packet transmission at a transmission rate at which a conventional station cannot receive the packet. Also, when a conventional station is not desired to start a transmission for fixed duration, the information of a packet length and a rate in the general decoding portion is spoofed in order that the value of (packet length)/(rate) may be the duration for which the communication is desired to be stopped. For example, the value of (packet length)/(rate) should originally correspond to the reception duration of the residual portion of the packet. However, for example, the information is spoofed in order to be the duration for which a NAV such as the end of ACK should be raised.
- Moreover, in this case, the high-grade communication station to be a communication party is needed to detect that these values described in the general decoding portion are spoofed for performing a correct reception operation without performing any malfunctions on the basis of the spoofed rate and the length. For this sake, a flag indicating the existence of spoofing is provided in the general decoding portion of a packet. Alternatively, a second communication method decoding portion, which all second communication stations can decode, is provided, and the fact that the general decoding portion is spoofed is described in the second communication method decoding portion. Then, after the general decoding portion has been transmitted, the high-grade communication station shifts to an arbitrary high grade rate mode, and transmits an actual data composed of a high-grade decoding portion.
- When the conventional station receives a general decoding portion including the spoofed information of a packet length and a rate, the conventional station believes the packet length and the rate to receive the residual packet at a specified rate for a period of (packet length)/(rate). Because the rate and the packet length are different from ones at which the packet is actually transmitted, the conventional station cannot decode the packet correctly, and the packet is destroyed.
- On the other hand, a high-grade communication station detects that the information of a packet length and a rate is spoofed by means of the flag in the general decoding portion. Alternatively, the high-grade communication station detects the spoofing owing to the capability of decoding the second communication method decoding portion. Then, when the general decoding portion is spoofed, the high-grade communication station shifts to the corresponding high grade rate mode, and receives the residual packet, i.e. a high-grade decoding portion. Thus, the high-grade communication station can decode actual data.
- As described above, in the case where a packet length and a rate are used for setting a period of time during which all transmission starts are stopped, there are plurality of combinations of spoofed packet lengths and spoofed rates for showing the same period of time to the conventional station. On the other hand, there is a plurality of transmission modes as a high-speed communication rate sometimes. Accordingly, when a plurality of modes each including high-speed communication rate, a mode by which the residual packet is transmitted may be presumed by the setting of a rate.
- Moreover, a second aspect of the present invention is a computer program described in a form capable of being read by a computer to execute on a computer system processing for a wireless communication operation in a wireless communication environment in which a first communication method and a second communication method coexist, the program including the steps of: generating a transmission packet composed of a first decoding portion and a second decoding portion, transmitting a first decoding portion of the transmission packet according to the first communication method, and transmitting a second decoding portion of the transmission packet according to the second communication method, receiving and analyzing a first decoding portion of a reception packet from another station, and receiving and analyzing a second decoding portion of the reception packet according to the second communication method.
- The computer program according to the second aspect of the present invention defines a computer program described in the form capable of being read by a computer for realizing predetermined processing on a computer system. In other words, by installing the computer program according to the second aspect of the present invention into a computer system, a cooperative operation is exhibited on the computer system, and the computer system operates as a wireless communication apparatus. By building a wireless network by activating a plurality of such wireless communication apparatus, operations and advantages similar to those of the wireless communication system according to the first aspect of the present invention can be obtained.
- According to the present invention, it is possible to provide a superior wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program in which each communication station can suitably perform random access on the basis of a carrier detection according to a CSMA system.
- Moreover, according to the present invention, it is possible to provide a superior wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program in which random access can be realized in a communication environment in which a plurality of communication modes each having a transmission rate different from each other intermixes.
- Moreover, according to the present invention, it is possible to provide a superior wireless communication system, a wireless communication apparatus, a wireless communication method and a computer program in which random access can be realized with a smaller overhead in a communication environment in which a plurality of communication mode, each having a transmission rate different from each other, intermixes.
- According to the present invention, the coexistence of the IEEE 802.11g and the IEEE 802.11a/b, both using the same band, can be realized without passing an RTS/CTS procedure. Consequently, an overhead can be remarkably reduced.
- Moreover, according to the present invention, the duration for an NAV can be flexibly set. Consequently, the throughput of a system can be improved.
- Further objects, features and advantages of the present invention will be apparent by more detailed descriptions based on the embodiments of the present invention and the attached drawings, which will be described later.
-
FIG. 1 is a view schematically showing a functional configuration of a wireless communication apparatus operating as a communication station in a wireless network according to one embodiment of the present invention; -
FIG. 2 is a view for illustrating a mechanism of a priority transmission based on difference of inter frame spaces; -
FIG. 3 is a view schematically showing one example of a frame configuration of a packet in the wireless network according to the present invention; -
FIG. 4 is view schematically showing a variation of a packet structure in the wireless network according to the present invention; -
FIG. 5 is a view showing a description example of Rate field in the IEEE 802.11a; -
FIG. 6 is a flowchart showing a reception processing procedure in the case where awireless communication apparatus 100 operates as a conventional station; -
FIG. 7 is a flowchart showing a reception processing procedure in the case where thewireless communication apparatus 100 operates as a high-grade communication station; -
FIG. 8 is a view showing one of communication operation examples based on CSMA/CA according to the present invention; -
FIG. 9 is a view showing one of communication operation examples based on RTS/CTS according to the present invention; -
FIG. 10 is a view showing one of communication operation examples based on RTS/CTS using Shot NAV according to the present invention; -
FIG. 11 is a view showing a communication operation example base on CSMA/CA according to a conventional technology; -
FIG. 12 is a view showing a communication operation example based on RTS/CTS according to a conventional technology; -
FIG. 13 is a view showing a communication operation example based on CSMA/CA under a communication environment in which conventional stations and high-grade communication stations intermix according to a conventional technology; -
FIG. 14 is a view showing a communication operation example based on RTS/CTS in conformity with the IEEE 802.11g according to a conventional technology; -
FIG. 15 is a view showing one example of the internal configuration of awireless reception unit 110 of a high-grade communication station capable of decoding a SIGNAL-2 portion; -
FIG. 16 is a view showing one example of the frame configuration of a packet transmitted according to the second communication method; and -
FIG. 17 is a view showing communication operation sequencing by which a plurality of reception stations replies by a time division response packet to a transmission packet from a transmission station. - The embodiments of the present invention are described in detail hereinafter with reference to the attached drawings.
- Channels of communication supposed in the present invention are wireless channels, and a network is built among a plurality of communication stations. Communication supposed in the present invention is a store and forward type traffic, and information is transferred per packet. Moreover, although each communication station is supposed to have a single channel in the following description, it is also possible to expand the description to the case where a transmission medium composed of a plurality of frequency channels, i.e. multi channels, is used.
- In a wireless network according to the present invention, each communication station directly (randomly) transmits information in accordance with an access procedure based on a carrier sense multiple access (CSMA) (carrier detection multiple connection), and can build an autonomous distributed type wireless network. Moreover, in the wireless network according to the present invention, transmission control using channel resources effectively is performed by means of transmission (MAC) frame in a gentle time division multiplexing access structure. In this case, each communication station can perform an access system based on a time synchronization such as reserving a frequency band and setting a priority use duration.
- One embodiment of the present invention supposes, for example, a communication environment in which both high-grade communication stations in conformity with the IEEE 802.11g corresponding to a high-speed edition standard using the same band and a conventional station in conformity with the conventional IEEE 802.11b intermixedly operate. That is, there are two kinds of communication terminals, that is; conventional stations which can transmit and receive only the packets modulated according to some limited modulation systems; and high grade communication stations which can receive packets according to a high-grade system in addition to the modulation system by which the conventional station can receive packets.
- The communication system in which the IEEE 802.11g and the IEEE 802.11b, both using the same band, intermix has a problem of coexistence. The reason is that, because the conventional station cannot receive a data packet transmitted at a high-speed rate, the conventional station cannot decode the Duration described in a MAC header to raise an NAV suitably, and consequently cannot avoid a collision. The present invention solves the coexistence problem by securing that the higher rank standard IEEE 802.11g assures the conventional standard IEEE 802.11b of the so-called upper compatibility. The solving method will be described later.
-
FIG. 1 schematically shows a functional configuration of a wireless communication apparatus operating as a communication station in a wireless network according to one embodiment of the present invention. Awireless communication apparatus 100 shown here can form a network while avoiding a collision in the same wireless system by performing a channel access effectively. Thewireless communication apparatus 100 is either of a conventional station in conformity with the IEEE 802.11a/b as a first communication method and a high-grade communication station in conformity with the IEEE 802.11g as a second communication method. - As shown in
FIG. 1 , thewireless communication apparatus 100 is composed of aninterface 101, adata buffer 102, acentral control unit 103, apacket generation unit 104, awireless transmission unit 106, atiming control unit 107, anantenna 109, awireless reception unit 110, apacket analysis unit 112, and an information storage unit 113. - The
interface 101 performs exchanges of various kinds of information between thewireless communication apparatus 100 and an external apparatus (such as a personal computer, though not shown) connected to thewireless communication apparatus 100. - The
data buffer 102 is used for temporarily storing the data transmitted from the external apparatus connected to thewireless communication apparatus 100 through theinterface 101, and the data received through a wireless transmission path before transmitting the data through theinterface 101. - The
central control unit 103 unitarily performs the administration of series of information transmission and reception processing in thewireless communication apparatus 100 and the access control of transmission paths. Basically, thecentral control unit 103 sets a timer of backoff to operate over a random period of time on the basis of CSMA while monitoring the states of the transmission paths, and performs access contention of acquiring a transmission right in the case where no transmission signals exist during this period of time. - The present embodiment adopts a mechanism of a priority transmission in the access contention to realize flexible QoS (see
FIG. 2 ). For example, thewireless communication apparatus 100 takes a normal operation mode after a packet transmission of another station or at the time of low traffic priority, and sets an inter frame space IFS to a longer DIFS, and further sets the random backoff. On the other hand, in case of performing the transmission of CTS successively to RTS from another station, in case of performing the transmission of a data packet successively to CTS, and in case of the transmission of ACK, thewireless communication apparatus 100 sets the inter frame space IFS to a shorter SIFS, which enables a transmission prior to the other stations performing normal transmission operations. - The
packet generation unit 104 generates a packet signal to be transmitted from the local station to a peripheral station. The packet hereupon includes a transmission request packet RTS from a communication station being a reception destination, a confirmation response packet CTS to the transmission request packet RTS, an ACK packet and the like as well as a data packet. For example, a data packet is generated by taking out of the transmission data stored in thedata buffer 102 for a predetermined length to be set as a payload. - In a MAC layer of a communication protocol, a MAC frame is configured by adding a MAC header to a payload, and furthermore a PHY header is added at a PHY layer to be a final transmission packet structure. In the present embodiment, the PHY header constitutes a first decoding portion, and the MAC frame portion constitutes a second decoding portion. The configuration of a packet signal will be described later.
- The
wireless transmission unit 106 and thewireless reception unit 110 correspond to an RF layer and the PHY layer in the communication protocol. - The
wireless transmission unit 106 performs the wireless transmission processing of a packet signal according to a predetermined modulation system and a transmission rate. To put it more specific, thewireless transmission unit 106 includes a modulator for modulating a transmission signal according to the predetermined modulation system, a D/A converter for converting a digital transmission signal into an analog signal, an up-converter for performing the frequency conversion of an analog transmission signal to up-convert the analog transmission signal, a power amplifier (PA) for amplifying the electric power of the up-converted transmission signal (all of thorn are not shown). Thewireless transmission unit 106 performs the wireless transmission processing at a predetermined transmission rate. - Moreover, the
wireless reception unit 110 performs the wireless reception processing of the packet signal from another station. To put it more specific, thewireless reception unit 110 is composed of a low noise amplifier (INA) for amplifying the voltage of a wireless signal receiving from another station through theantenna 109, a down-converter for down-converting the voltage-amplified reception signal by frequency conversion, an automatic gain controller (AGC), an A/D converter for performing the digital conversion of an analog reception signal, a demodulator for performing a synchronous processing for acquiring a synchronization, a channel estimation, a demodulation processing by means of a demodulation system such as OFDM, and the like (all of them are not shown). - In the case where the
wireless communication apparatus 100 conforms to the IEEE 802.11a/b as the first communication method, thewireless transmission unit 106 and thewireless reception unit 110 respectively perform a transmission and a reception of a packet according to a modulation system and a transmission rate in conformity with a wireless LAN standard. Moreover, in the case where thewireless communication apparatus 100 conforms to the IEEE 802.11g as the second communication method, it is possible for thewireless communication apparatus 100 to perform a transmission and reception of a packet according to a modulation system and a transmission rate in conformity with the IEEE 802.11a/b. In addition, thewireless communication apparatus 100 can perform a transmission and a reception of a packet at a transmission rate inherent to the IEEE 802.11g (i.e. a transmission and a reception unable to be received by the IEEE 802.11a/b). In the latter case, the first decoding portion of a packet composed of the PHY header is transmitted and received at a transmission rate capable of being received by the IEEE 802.11a/b, but the second decoding portion composed of the MAC frame is transmitted and received at a transmission rate in conformity with the IEEE 802.11g. - The
antenna 109 performs the wireless transmission of a signal to another wireless communication apparatus on a predetermined frequency channel, or collects a signal transmitted from another wireless communication apparatus. The present embodiment is provided with a single antenna, and it is supposed that a transmission and a reception cannot simultaneously performed in parallel. - The
timing control unit 107 controls a timing for transmitting and receiving a wireless signal. For example, thetiming control unit 107 controls its own packet transmission timing, the transmission timing of each packet (such as RTS, CTS, data, and ACK) in conformity with the RTS/CTS system (setting of an inter frame space IFS and the backoff), the setting of the NAV at the time of reception of a packet addressed to another station, and the like. - The
packet analysis unit 112 analyzes the packet signal which can be received from another station. In the present embodiment, the packet is composed of a first decoding portion and a second decoding portion. The details of a packet decoding method will be described later. - The information storage unit 113 stores an execution procedure instruction of a series of access control operations to be executed by the
central control unit 103, and information obtained from an analysis result of a reception packet. - As described above, in a wireless network of the present embodiment, there are two kinds of communication stations of conventional stations capable of the transmission and the reception of a packet modulated according to some limited modulation systems, and high grade communication stations capable of the reception in conformity with a high-grade system in addition to the modulation systems in which the conventional stations can perform receptions. There is a coexistence problem in a communication system in which the IEEE 802.11g and the IEEE 802.11b using the same band intermix. The present embodiment solves this problem by making the high-grade communication stations provide the so-called ad-hoc compatibility to the conventional stations. The details of the solution will be described.
-
FIG. 3 schematically shows the configuration of a packet which thewireless communication apparatus 100 operating as a communication station in the wireless network of the present embodiment transmits and receives. - In a MAC layer of the communication protocol, a MAC frame is constituted by adding a MAC header to a payload (corresponding to an IP packet). Moreover, in a PHY layer, a PHY header is added to the MAC frame to be a final transmission packet structure. The PHY header constitutes a first decoding portion, and the MAC frame portion constitutes a second decoding portion. As shown in
FIG. 3 , a packet is composed of a physical layer convergence protocol (PLCP) preamble portion and a SIGNAL portion as the PHY header, and the MAC frame. The MAC frame is composed of the MAC header and a data portion. - The PHY header corresponds to the first decoding 30 portion, and the MAC frame corresponds to the second decoding portion.
- In the case where the transmission station of a packet is a conventional station in conformity with the IEEE 802.11a/b, both of the PHY header and the MAC frame are transmitted according to the first communication method.
- Moreover, in the case where the transmission station of a packet is a high-grade communication station in conformity with the IEEE 802.11g, the communication station transmits the whole packet according to the first communication method when the communication station transmits the packet to a conventional station. On the other hand, when the high-grade communication station transmits a packet to a high-grade communication station, the transmitting communication station transmits only the first decoding portion of the packet according to the first communication method, by which all communication stations can receive the first decoding portion, and can transmit the second decoding portion of the packet including the data portion according to the second communication method having a higher transmission rate.
- On the transmission side of the shown packet, first, the PLCP preamble portion is transmitted as the head of the packet, and next, the SIGNAL portion and the MAC frame are transmitted.
- The PLOP preamble portion includes elements such as a signal detect (Signal Detect) and a channel estimation (Channel Estimation). Consequently, a peripheral station knows the existence of a signal from a communication station by receiving the PLCP preamble portion, and performs the estimation of a transmission channel and the like.
- The communication station knowing the transmission of the signal by the detection of the PLCP preamble portion starts the reception of the subsequently arriving SIGNAL portion. Because the SIGNAL portion is transmitted according to the first communication method, which all communication station know, both of the conventional stations and the high-grade communication stations can receive the SIGNAL portion.
- The SIGNAL portion includes a transmission rate (Rate) of the subsequent MAC frame, the length (Length) of a residual data of the packet such as the MAC frame, parity (Parity), a reserved area (Reserve) and the like.
- The MAC frame is modulated according to the transmission rate specified by the transmission rate (Rate) of the SIGNAL portion. The MAC frame is composed of the MAC header and the data portion corresponding to the payload. The MAC header describes an address (RX Address) of the reception station of the packet, Duration specifying the duration in which the stations other than the reception station severally should raise the NAV.
- A communication station which can normally receive and decode the MAC header portion compares the address of the local station with the reception address. When they coincide with each other, the communication station receives the residual portion of the packet at a specified rate for the duration of (packet length)/(transmission rate) in accordance with the transmission rate (Rate) and the packet length (Length) information, both described in the SIGNAL portion. Moreover, when its own address and the received address do not coincide with each other, the communication station raises the NAV for the Duration described in the MAC header, and restrains any transmissions from the local station. The procedure for securing a band in accordance with the procedure mentioned above is generally called as virtual carrier sense.
- Now, when a transmission station of a packet being a high-grade communication station according to the IEEE 802.11b performs the transmission of the packet to a high-grade communication station, the transmission station transmits only the first decoding portion according to the first communication method, which all communication stations can receive, but transmits the second decoding portion including the data portion according to the second communication method having the higher transmission rate. Consequently, because the conventional stations cannot receive the second decoding portion, the conventional stations cannot decode the Duration described in the MAC header. Consequently, there is a problem in which the conventional stations cannot know the duration for which the conventional stations should severally raise the NAV.
- Conventionally, the description of the Duration in the MAC header has been used for band securing. However, for realizing the coexistence of the IEEE 802.11g and the IEEE 802.11a/b, a mechanism is needed for the conventional stations to recognize the duration for which the conventional stations should severally raise the NAV on the basis of other information without using the description of the Duration.
- Accordingly, the present embodiment prepares a mechanism in which, even if a packet is transmitted according to the IEEE 802.11g as the second communication method, the first decoding portion, which all communication stations can certainly receive, is provided, and the duration corresponding to the NAV is specified by means of the first decoding portion.
- As shown in
FIG. 3 , the first decoding portion is composed of the PHY header of a packet. Then, the period of time corresponding to the Duration is described in a pseudo-way in the SIGNAL portion, which all communication stations can receive, by using the information of the transmission rate (Rate) and the packet length (Length). That is, the information of the transmission rate (Rate) and the packet length (Length) is spoofed so that the value of (packet length)/(rate) may be equal to the duration for which any communications are desired to be stopped. - As a result, the conventional stations severally set the packet length and the transmission rate, which are different from the fact, and perform the reception for a period of time corresponding to the Duration. The actual packet is not transmitted over the period of (packet length)/(rate), but the conventional stations do not start their transmissions for the duration corresponding to Duration. As a result, the conventional stations restrain their transmissions and continue their receiving for the duration for which communications are desired to be stopped.
- Incidentally, in this case, after the conventional stations have performed the receptions for the spoofed period of (packet length)/(rate), CRC errors are certainly generated. The IEEE 802.11 has a rule in which, when a CRC error is generated in the data portion, any receptions are restrained for a period of time EIFS longer than a normal inter frame space DIFS. Accordingly, it is desirable to perform the spoofing so that a period of time obtained by subtracting “EIFS DIFS” from the duration for which the receptions are truly desired to be continued as the period of (packet length)/(rate) for avoiding the conventional station being always unfairly treated.
- As described above, the high-grade communication stations use the information of the transmission rate (Rate) and the packet length (Length) so as to describe the period of time corresponding to Duration in the first decoding portion in a pseudo-way, and thereby the high grade communication stations supply the so-called ad-hoc compatibility to the conventional stations. In this case, for a communication procedure according to the high-grade communication method in conformity with the IEEE 802.11g is being performed, the conventional stations avoid any collisions, and thereby a normal network operation can be realized.
- Moreover, in the case where the high-grade communication stations use a high-speed transmission rate which the first communication method cannot deal with, a value which the first communication method can deal with should be set in the transmission rate (Rate) field of the SIGNAL portion as the spoofing in order that the conventional stations can correctly decode the first decoding portion. In this case, the packet length (Length) should be also spoofed in accordance with the spoofed transmission rate (Rate) value.
- As described above, the spoofing is performed in the SIGNAL portion in order that the value of (packet length)/(rate) may be equal to the duration for which the conventional stations are desired to stop communications. Hereupon the duration for which the conventional stations are desired to stop communications, in short, indicates the duration until a communication transaction performed according to the second communication method ends. To put it more specific, the duration indicates the duration until an ACK transmission in a communication procedure performed according to the second communication method ends. Moreover, when packet transmissions are performed in a communication procedure for performing multiple connections with a plurality of communication stations in a MAC frame according to the second communication method, the above-mentioned duration corresponds to the duration until all of the ACK transmissions performed from each of the remote stations in time division multiplex end. Incidentally, Japanese Patent Application No. 2003-297919 which has been assigned to the present applicant, discloses a communication system in which a transmission station transmits a data frame addressed to a plurality of reception stations by means of space division multiple access (SDMA) and each reception station replies ACK in time division multiplex. Moreover, the transmission of the ACK packet hereupon is not limited to the transmission of the ACK packet alone, but includes the case where the ACK packet is multiplexed by the other kinds of packets such as an RTS packet, a CTS packet and a Data packet to be transmitted.
- Hereupon, it is necessary for a high-grade communication station being a communication party to detect that the values of spoofed Rate and Length described in the first decoding portion are spoofed for performing a correct reception operation without performing any malfunctions based on the spoofed Rate and Length. That is, for realizing the mechanism of the ad hoc compatibility in a high-grade communication station, it is needed for each high-grade communication station to recognize that the information of a packet length and a transmission rate described in the first decoding portion is spoofed. Moreover, for preventing the conventional stations from knowing that the information is spoofed, only the high-grade communication stations mutually recognize the fact, and the first communication stations should operate in accordance with the description in the first decoding portion.
- In the embodiment shown in
FIG. 3 , for example, a flag of one bit indicating the existence of the spoofing is prepared in the reserved area (Reserve) of the SIGNAL portion. Then, when a high-grade communication station detect that the information of the packet length and the rate is spoofed by means of the flag in the first decoding portion, the high-grade communication station shifts to the corresponding high grade rate mode, and can decode actual data by receiving the residual packet, i.e. a high-grade decoding portion. In this case, the high grade communication station destroys the information of the packet length and the rate read from the SIGNAL portion of the received packet. - In the case where only a single communication method (communication mode) is defined in the second communication method for performing the packet transmission and the reception at a high-speed transmission rate, the shift of the communication method can be specified only by means of the spoofed flag of one bit as described above with
FIG. 3 being referred to. On the contrary, in the case where the second communication method includes a plurality of transmission modes, it becomes impossible to specify a transmission mode only by means of the spoofed flag of one bit. - The simplest way of specifying one of a plurality of transmission modes as described above is to add a field for specifying a transmission mode in a packet.
FIG. 4 shows a variation of the packet structure shown inFIG. 3 . In the shown example, a SIGNAL-2 portion (high throughput (HT) PHY portion) is furthermore added after the SIGNAL portion in a packet transmitted according to the second communication method. - In the shown example, the SIGNAL-2 portion includes a field describing a true transmission rate (True Rate) and a true packet length (True Length), and a field describing a mode parameter value (Mode Parameter). Because the SIGNAL-2 portion is transmitted at a fixed transmission rate at which all high-grade communication stations can perform a reception, the high-grade communication station which has received the packet performs an reception operation in accordance with the true transmission rate (True Rate) and the true packet length (True Length). Moreover, conventional stations cannot decode the SIGNAL-2 portion, and set their reception duration on the basis of the rate and the length described in the SIGNAL portion.
- Now, it is needed for each of the high-grade communication stations to recognize the spoofing in the way that the conventional stations cannot know the spoofing of the transmission rate and the packet length in the SIGNAL portion, and the conventional stations should operate in conformity with the description in the SIGNAL portion. For the sake of this, a packet is transmitted according to the communication method in which all high-grade communication stations can decode the SIGNAL-2 portion (HT-SIGNAL portion) as the second communication method decoding portion and the conventional stations cannot decode the SIGNAL-2 portion.
- For example, the SIGNAL-2 portion is transmitted at a low transmission rate of about 6 Mbps for all high-grade communication stations can receive the SIGNAL-2 portion, and a modulation processing of the SIGNAL-2 portion is performed according to a modulation system which each of the high-grade communication stations know but the first communication stations do not know. Thereby, only the high-grade communication stations can demodulate the SIGNAL portion to recognize that the SIGNAL portion is spoofed.
- In such a case, a high-grade communication station receiving the packet tries to decode the SIGNAL-2 portion in accordance with both of the first communication method and a communication method which the first communication stations cannot decode, and can recognize that the SIGNAL portion is spoofed by the fact that the SIGNAL-2 portion can be decoded according to the latter method. Then, the high-grade communication station can perform the reception processing of the second decoding portion according to the communication mode obtained from the SIGNAL-2 portion.
- The SIGNAL-2 portion is located before the MAC frame being the second decoding portion. Consequently, in the case where the information of a packet length and a transmission rate is spoofed in the first decoding portion, a high-grade communication station receiving the packet can perform the reception operation of the second decoding portion after the SIGNAL-2 portion on the basis of the true packet length (True Length) and the true transmission rate (True Rate) describe in the SIGNAL-2 portion.
- A high-grade communication station performing a packet transmission modulates the second communication method decoding portion according to a modulation system known only by each of the high-grade communication stations, and thereby it can be realized that all of the high-grade communication stations can decode the second communication method decoding portion, and that conventional stations cannot decode the second communication method decoding portion. For example, in case of performing a phase modulation of the SIGNAL-2 portion such as BPSK, a phase difference θ, which second communication stations jointly own, may be given to a signal point location, or a signal point may be translated by a known quantity Δd. On the other hand, a high-grade communication station receiving the packet performs the phase demodulation of the packet in consideration of the phase shift of the signal point location such as the phase difference −θ or the movement quantity −Δd. Then, the high-grade communication station can know the spoofing of the first decoding portion by the fact that the SIGNAL-2 portion could be decoded.
-
FIG. 16 shows an example of the inner structure of 51 thewireless reception unit 110 in this case. Thewireless reception unit 110 is composed of an RF unit and a PITY portion. The PHY portion is composed of a first demodulation unit, a second demodulation unit, and a reception processing unit for processing reception data which correctly demodulated by either of these demodulation units. - The reception processing unit notifies the first demodulation unit of the modulation system (transmission rate) obtained from the first decoding portion. The first demodulation unit supposes that the first decoding portion is not spoofed, and demodulates the signal after that according to the modulation system (transmission rate) described in the first decoding portion by the signal point location same as that of the first decoding portion.
- The second demodulation unit supposes that the SIGNAL-2 portion follows the first decoding portion, and demodulates the SIGNAL-2 portion according to a known modulation system (transmission rate) by the signal point location whose phase has been rotated by 90 degrees.
- The SIGNAL-2 portion has a fixed length. Consequently, when it becomes clear that the portion is the SIGNAL-2 portion after the demodulation of a predetermined length of the SIGNAL-2 portion, it is found that the first decoding portion is spoofed. If not so, it is found that the first decoding portion is not spoofed. In the latter case, the second demodulation unit continues the demodulate at the unrotated signal point location by the first demodulation unit. Thereby, it is possible to suggest whether the spoofing is performed or not without providing any spoofed flag in the reserved area (Reserve) of the first decoding portion.
- Incidentally, a modulation system for providing a phase difference to a signal point on a constellation to perform mapping is, for example, disclosed in Japanese Unexamined Patent Publication No. Hei 11-146025.
- The high-grade communication station can decode the second decoding portion (see DATA portion of
FIG. 16 ) in principle, as described above. However, it is supposed that the second decoding portion cannot be decoded when the distance between communication terminals is large, or when a MIMO communication is performed. In such cases, it is possible to estimate how long a packet transmission terminal directs the other terminals to restrain their transmissions by using the first decoding portion (SIGNAL portion inFIG. 16 ) and the second communication method decoding portion (HT-SIGNAL portion inFIG. 16 ), both modulated at a fixed low-speed rate. - The value of (packet length)/(transmission rate) calculated on the basis of the description in the SIGNAL portion as the first decoding portion is the duration until the reception of ACK in
FIG. 16 is completed. Moreover, the value of (True Length)/(True Rate) calculated on the basis of the I-IT-SIGNAL portion as the second communication method decoding portion corresponds to the duration until the transmission of a true packet is completed. The difference between the two (Length)/(Rate) (by adding EIF-DIFS inFIG. 16 ) is a value corresponding to an NAV indicating how long the packet transmission terminal directs the other terminals to restrain their transmissions. - The method of adding the field (SIGNAL-2 portion or HT-SIGNAL portion) as shown in
FIG. 4 for specifying a transmission mode to a packet for enabling the mutual notification of the transmission mode among high-grade communication stations is simple, but the decrease of the overhead and the communication efficiency caused by the transmission data becomes a problem. - Now, as described above, in the case where RATE and Length in the SIGNAL portion are set in a pseudo-way, there are a plurality of spoofed combinations of the packet length and the rate for indicating the same period of time. For example, because the period of time necessary for transmitting 1200 bits at 6 Mbps and the period of time necessary for transmitting 2400 bits at 12 Mbps are the same, a reception station does not care which period of time is set as Rate.
- However, in the case where a high-grade communication station uses a high-speed transmission rate which the first communication method cannot deal with, it is necessary that a value corresponding to the first communication method is spoofed in the transmission rate (Rate) field of the SIGNAL portion for enabling the conventional stations to decode the first decoding portion correctly. In this case, it is needed to perform the spoofing by adjusting the value of the packet length (Length) in order to be able to obtain a desired Duration value according to the spoofed transmission rate (Rate) value.
- In the example shown in
FIG. 3 , in the case where a spoofed flag is set in the SIGNAL portion being the first decoding portion, the high-grade communication stations destroy the information of Rate in the SIGNAL portion as being spoofed. On the other hand, in the example shown inFIG. 4 , it is possible to indicate which mode the successive high-grade modulation system takes by using the information of True Rate described in the SIGNAL-2 portion. -
FIG. 5 shows a description example of the Rate field in the IEEE 802.11a. As shown inFIG. 5 , the IEEE 802.11a sets eight transmission rates of 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48 Mbps and 54 Mbps. In the Rate field, transmission rates are expressed by means of four bits. When a spoofed flag is set, it is possible to assign the definition of the Rate field on a standard to the specifying of an actual high-speed transfer mode. - In the example shown in
FIG. 5 , though the Rate field is four bits, all of the LSB's are set to be 1. Consequently, it is possible to specify each of 3 bits, i.e. eight modes can be specified. Moreover, the IEEE 802.11b being a conventional standard includes the least upper bound of settable packet length (Length). Consequently, when a higher rank rate is used for spooling, the Length field is lacked. Then, there is a problem in which a sufficient value of Duration cannot be secured for (packet length (Length))/(rate (Rate)) (namely, an NAV of a long duration cannot be spoofed). Accordingly, actually four rates of 6 Mbps, 9 Mbps, 12 Mbps, and 18 Mbps are used for the specification of the high-speed transfer mode for enabling the setting of large value Duration (=(Length)/(Rate)). Because there is the possibility that there is a conventional station which, when a Length exceeding the least upper bound is set, recognizes the information as an error and destroys the information, the definition is provided (the IEEE 802.11a indicates the Length information by bits, and the IEEE 802.11b indicates the Length information by periods of time). - Incidentally, because the IEEE 802.11n supposes a system using a multi-input multi-output (MIMO) communication and a system expanding a communication use band as a high-speed transmission, a plurality of transmission modes can exist according to the combination of the number of antennas used for the MIMO communications and communication use bands. In such a case, the transmission mode may be notified among the high-grade communication stations by means of any one of the above-described methods.
- Hereupon, the MIMO communication indicates a technique for achieving the increase of a transmission capacity and the improvement of a communication speed by realizing space division multiplexing, i.e. a plurality of logically independent transmission paths, by providing a plurality of antenna elements both at the transmitter side and at the receiver side. Because the MIMO communication uses the space division multiplexing, frequency usability is good.
- Next, a reception processing procedure of the
wireless communication apparatus 100 in the wireless network according to the present embodiment is described. -
FIG. 6 shows a reception processing procedure in the form of a flowchart in the case where thewireless communication apparatus 100 operates as a conventional station. Such a processing procedure is actually realized in a form in which thecentral control unit 103 executes the instruction executing program stored in the information storage unit 113. - When the
wireless communication apparatus 100 receives a PLOP preamble portion in step S1, thewireless communication apparatus 100 successively receives the SIGNAL portion of the PHY layer in step S2. - Then, the
wireless communication apparatus 100 decodes the information of the transmission rate (Rate) and the packet length (Length) described in the SIGNAL portion in step S3, and calculates the reception duration determined by (packet length)/(transmission rate). - Next, the
wireless communication apparatus 100 receives a MAC header portion at the transmission rate specified by RATE in the SIGNAL portion in step S4. Now, when the wireless communication apparatus can decode the reception destination address on the basis of the MAC header in step S5, thewireless communication apparatus 100 compares the reception destination address with the local station address in step S6. Then, when both the addresses coincide with each other, thewireless communication apparatus 100 performs the reception processing for the packet length specified by the Length of the SIGNAL portion in step S7. - Moreover, when the reception destination address and the local station address do not coincide with each other in step S6, the
wireless communication apparatus 100 raises an NAV for the Duration determined by (packet length)/(transmission rate), and restrains its transmission in step S8. - Moreover, when the
wireless communication apparatus 100 cannot decode the reception destination address on the basis of the MAC header in step S5, thewireless communication apparatus 100 performs reception processing for a packet length specified by the Length of the SIGNAL portion in step S7. - Moreover,
FIG. 7 shows a reception processing procedure in the form of a flowchart when thewireless communication apparatus 100 operates as a high-grade communication station. Such a processing procedure is actually realized in the form in which thecentral control unit 103 executes the instruction executing program stored in the information storage unit 113. - When the
wireless communication apparatus 100 receives a PLCP preamble portion in step S11, thewireless communication apparatus 100 successively receives the SIGNAL portion of the PHY layer in step S12. - Then, the
wireless communication apparatus 100, for example, refers to the spoofed flag in the Reserve field to judge whether the information of the transmission rate (Rate) and the packet length (Length) is spoofed or not in step S13. - Alternatively, the
wireless communication apparatus 100 judges whether the SIGNAL-2 portion is provided successively to the SIGNAL portion or not. Thereby, the wireless communication apparatus judges whether the information of the transmission rate (Rate) and the packet length (Length) is spoofed or not in step S13. In this case, thewireless communication apparatus 100 tries to demodulate the SIGNAL-2 portion according to the modulation system which each of the high-grade communication stations knows but the first communication stations do not know in parallel with thewireless communication apparatus 100 demodulates the signal after the SIGNAL-2 portion according to the modulation system (transmission rate) described in the SIGNAL portion. Then, thewireless communication apparatus 100 can recognized that the SIGNAL portion is spoofed on the basis of the fact thewireless communication apparatus 100 can decode the SIGNAL-2 portion according to the latter modulation system. - Now, when the spoofed flag is not set, the
wireless communication apparatus 100 can recognize that the packet is transmitted at the transmission rate at which the conventional stations can receive the packet. Then, thewireless communication apparatus 100 decodes the information of the transmission rate (Rate) and the packet length (Length) described in the SIGNAL portion in step S14, and calculates the reception duration determined by (packet length)/(transmission rate). - Next, the
wireless communication apparatus 100 receives the MAC header portion at the transmission rate specified by the RATE in the SIGNAL portion in step S15. Now, when the wireless communication apparatus can decode the reception destination address on the basis of the MAC header in step S16, thewireless communication apparatus 100 compares the reception destination address with the local station address in step S17. Then, when both the addresses coincide with each other, thewireless communication apparatus 100 performs the reception processing for the packet length specified by the Length of the SIGNAL portion in step S18. - Moreover, when the reception destination address and the local station address do not coincide with each other in step S17, the
wireless communication apparatus 100 raises an NAV for the Duration specified by the MAC header, and restrains its transmission in step S19. - Moreover, when the
wireless communication apparatus 100 cannot decode the reception destination address on the basis of the MAC header in step S16, thewireless communication apparatus 100 performs reception processing for a packet length specified by the Length of the SIGNAL portion in step S18. - On the other hand, when the
wireless communication apparatus 100 judges that the second decoding portion of the packet is transmitted at the transmission rate at which only the high-grade communication stations can receive the packet on the basis of the setting of the spoofed flag in the SIGNAL portion or on the basis of the provision of the SIGNAL-2 portion in step S13, thewireless communication apparatus 100 shills to a high speed transmission mode in step S20, and receives the MAC header portion in step S15. Thewireless communication apparatus 100 performs the reception processing according to, for example, True Rate and True Length described in the SIGNAL-2 portion. - Now, when the
wireless communication apparatus 100 can decode the reception destination address on the basis of the MAC header in step S16, thewireless communication apparatus 100 compares the reception destination address with the local station address in step S17. Then, when both the addresses coincide with each other, thewireless communication apparatus 100 performs the reception processing for the packet length specified by the Length of the SIGNAL portion in step S18. - Moreover, when the reception destination address and the local station address do not coincide with each other in step S17, the
wireless communication apparatus 100 raises an NAV for the Duration determined by (packet length)/(transmission rate), and restrains its transmission in step S19. - Lastly, a communication operation in the wireless network according to the present embodiment is described. In the wireless network, conventional stations in conformity with the conventional IEEE 802.11b and high-grade communication stations in conformity with the IEEE 802.11g corresponding to a high-speed edition standard using the same band as that of the IEEE 802.11b intermixedly operates.
-
FIG. 8 shows a communication operation example based on CSMA/CA. In the shown example, there are fourcommunication stations # 0 to #3 in a communication environment. Among them, thecommunication station # 0 and thecommunication station # 2 are supposed to be high-grade communication stations, and thecommunication station # 2 and thecommunication station # 3 are supposed to be conventional stations. - Each communication station having transmission data monitors a medium state for a predetermined inter frame space DIFS from the last detection of a packet. When any media are clear, namely when there are no transmission signals, the communication station performs random backoff. Furthermore, when there are no transmission signals also in this period, a transmission right is given to the communication station. In the shown example, the
communication station # 0 setting the random backoff shorter than that of the other peripheral stations acquires the transmission right, and can start a data transmission to thecommunication station # 1 similarly as a high-grade communication station. - At the time of the data transmission, the transmission source
communication station # 0 transmits a first decoding portion corresponding to the PHY header according to a first communication method, which all communication stations can receive, and transmits a second decoding portion corresponding to the MAC frame according to a second communication method, which only the high-grade communication stations can receive. Then, the transmission sourcecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until an ACK packet for which communications are desired to be stopped. - Alternatively, the transmission source
communication station # 0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, the transmission sourcecommunication station # 0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the transmission sourcecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped. - The
communication station # 2 and thecommunication station # 3 as the conventional stations can hear the SIGNAL portion of the packet from thecommunication station # 0, and set a packet length and a transmission rate different from the actual state to perform reception for a period of time corresponding to the duration until the transmission of the ACK packet ends. The data packet from thecommunication station # 0 is not transmitted for a period of (packet length)/(rate), but thecommunication station # 2 and thecommunication station # 3 try to receive the data packet and do not start any transmissions. As a result, thecommunication stations # 2 and #3 restrain their transmissions. Moreover, because the rate and the packet length are different from the real transmission of the packet, the rate and the packet cannot be normally decoded, and thecommunication station # 2 and thecommunication station # 3 destroy the packet. - Moreover, in the reserved area (Reserve) of the SIGNAL portion, a spoofed flag indicating the spoofing of the information of the transmission rate (Rate) and the packet length (Length) of the SIGNAL portion is set. In this case, the communication mode of a MAC frame, i.e. the true transmission rate (True Rate) and the true packet length (True Length), is indicated by a combination of Rate and Length. Alternatively, by providing the SIGNAL-2 portion, the spoofing of the information of the transmission rate (Rate) and the packet length (Length) of the SIGNAL portion is indicated, and the true transmission rate (True Rate) and the true packet length (True Length) of the MAC frame are described.
- The
communication station # 1 being the communication party is a high-grade communication station, and detects the spoofing of the information of a packet length and a rate of a SIGNAL portion on the basis of the spoofed flag. Alternatively, thecommunication station # 1 detects the spoofing of the information of the packet length and the rate of a SIGNAL portion on the basis of the success of the decoding of the SIGNAL-2 portion. Then, thecommunication station # 1 destroys the reception result of the SIGNAL portion in response to the detection of the spoofing. Furthermore, thecommunication station # 1 receives the MAC frame as the successive second decoding portion at the transmission rate indicated by the SIGNAL portion or the SIGNAL-2 portion, and performs the reception operation of the data addressed to the local station for the duration of Duration described in the MAC header. Then, when the data reception is completed, thecommunication station # 1 returns an ACK packet to the data transmission sourcecommunication station # 0. - In such a way, according to the CSMA/CA system, contention is avoided while a single communication station acquires a transmission right, and any collisions can be avoided by the stop of peripheral stations' data transmission operations during a data communication operation. Moreover, in case of inexistence of the concealed terminal problem, peripheral stations can raise NAV's to avoid collisions without passing through the RTS/CTS procedure as shown in the drawings. Thereby, overhead can be reduced.
-
FIG. 9 shows a communication operation example based on RTS/CTS. In the shown example, there are fourcommunication stations # 0 to #3 in a communication environment. Among them, thecommunication station # 0 and thecommunication station # 2 are supposed to be high-grade communication stations, and thecommunication station # 2 and thecommunication station # 3 are supposed to be conventional stations. - Each communication station is in the following communication state. That is, the
communication station # 2 can communicate with the adjacentcommunication station # 0, and thecommunication station # 0 can communicate with the adjacentcommunication stations # 1 and #2. Thecommunication station # 1 can communicate with the adjacentcommunication stations # 0 and #3. Thecommunication station # 3 can communicate with the adjacentcommunication station # 1. Furthermore, thecommunication station # 2 is a concealed terminal for thecommunication station # 1, and thecommunication station # 3 is a concealed terminal for thecommunication station # 0. - Each communication station having transmission data monitors a medium state for a predetermined inter frame space DIFS from the last detection of a packet. When any media are clear, namely when there are no transmission signals, the communication station performs random backoff. Furthermore, when there are no transmission signals also in this period, a transmission right is given to the communication station. In the shown example, the
communication station # 0 setting the random backoff shorter than that of the other peripheral stations acquires the transmission right, and can start a data transmission to thecommunication station # 1 similarly as a high-grade communication station after the inter frame space DIFS. - That is, the data transmitting
communication station # 0 transmits a transmission request packet (RTS) to thecommunication station # 1. To this transmission, the reception destinationcommunication station # 1 returns a confirmation note (CTS) to thecommunication station # 0 after the shorter inter frame space SIFS (Short IFS). - Now, at the time of an RTS packet, the
communication station # 0 transmits a first decoding portion corresponding to the PHY header according to a first communication method, which all communication stations can receive, and transmits a second decoding portion corresponding to the MAC frame according to a second communication method, which only the high-grade communication stations can receive. Then, the transmission sourcecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until an ACK packet for which communications are desired to be stopped. - Alternatively, the transmission source
communication station # 0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, thecommunication station # 0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, thecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped. - The
communication station # 2 as a conventional station can hear the SIGNAL portion of the RTS packet from thecommunication station # 0, and set a packet length and a transmission rate different from the actual state to perform a reception operation for a period of time corresponding to (packet length)/(rate). The RTS packet from thecommunication station # 0 is not transmitted for a period of (packet length)/(rate), but thecommunication station # 2 tries to receive the data packet and do not start any transmissions. As a result, thecommunication station # 2 restrains its transmission until the transmission of the ACK packet is completed. Moreover, because the rate and the packet length are different from the real transmission of the packet, the rate and the packet cannot be normally decoded, and thecommunication station # 2 destroys the packet to transmitted according to the second communication method after that. - Moreover, the reception destination
communication station # 1 transmits the first decoding portion corresponding to the PHY header according to the first communication method, which all communication station can receive, at the time of a transmission of a CTS packet, and transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, thecommunication station # 1 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until the ACK packet for which communications are desired to be stopped. - Alternatively, the reception destination
communication station # 1 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system which each high-grade communication station knows but the first communication stations do not know. After that, the reception destinationcommunication station # 1 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high grade communication stations can receive. Then, the reception destinationcommunication station # 1 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped. - The
communication station # 3 as the conventional station can hear the SIGNAL portion of the CTS packet from thecommunication station # 1, and sets a packet length and a transmission rate different from the actual state to perform reception for a period of time corresponding to the duration until the transmission of the ACK packet ends. The CTS packet from thecommunication station # 1 is not transmitted for a period of (packet length)/(rate), but thecommunication station # 3 tries to receive the CTS packet and do not start any transmissions. As a result, thecommunication station # 3 restrains its transmission until the completion of the transmission of the ACK packet. Moreover, because the rate and the packet length are different from the real transmission of the packet, the rate and the packet length cannot be normally decoded, and thecommunication station # 3 destroy the packet to be transmitted after that according to the second communication method. - Then the
communication station # 0 starts the transmission of a data packet in response to the reception of the CTS packet after the inter frame space SIPS. - At the data transmission, the transmission source
communication station # 0 transmits the first decoding portion corresponding to the PHY header according to the first communication method, which all communication stations can receive, and also transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the transmission sourcecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header, and sets a spoofed flag indicating the spoofing. - Alternatively, the transmission source
communication station # 0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, the transmission sourcecommunication station # 0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the transmission sourcecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped. - The
communication station # 1 detects the spoofing of the information of a packet length and a rate of a SIGNAL portion on the basis of the spoofed flag. Alternatively, thecommunication station # 1 detects the spoofing of the information of the packet length and the rate of the SIGNAL portion on the basis of the success of the decoding of a SIGNAL-2 portion. Then, thecommunication station # 1 destroys the reception result of the SIGNAL portion in response to the detection of the spoofing. Furthermore, thecommunication station # 1 receives the MAC frame as the successive second decoding portion at the transmission rate indicated by the SIGNAL portion or the SIGNAL-2 portion, and performs the reception operation of the data addressed to the local station for the duration of Duration described in the MAC header. Then, when the reception of the data packet from thecommunication station # 0 is completed, thecommunication station # 1 returns an ACK packet to the data transmission sourcecommunication station # 0 after the inter frame space SIFS. - As described above, when a concealed terminal receives at least one of the RTS and the CTS, the concealed terminal sets a transmission stop duration of the local station for the duration in which the data transmission based on the RTS/CTS procedure is expected to be performed, and thereby collisions can be avoided.
- However, in the example shown in
FIG. 9 , in the case where the duration until the end of the RTS/CTS procedure (i.e. the duration until the ACK) is specified as the Duration, peripheral stations must wait until the last even if the RTS/CTS procedure is broken on the way, communication resources are wasted. - Accordingly, also a mechanism called as a Short NAV can be considered. In the Short NAV, each packet of the RTS, the CTS and data secures only the end of the next packet as the Duration. For example, the RTS packet is secured until the end of the CTS packet; the CTS packet is secured until the end of the data packet; the data packet is secured until the end of the ACK packet severally as the Duration. Consequently, even if the RTS/CTS procedure is broken halfway, the peripheral stations are not required to wait until the last.
-
FIG. 10 shows a communication operation example based on the RTS/CTS using the Short NAV. Incidentally, in the shown example, a communication environment similar to one shown inFIG. 9 is supposed. - Each communication station having transmission data monitors a medium state for a predetermined inter frame space DIFS from the last detection of a packet. When any media are clear, namely when there are no transmission signals, the communication station performs random backoff. Furthermore, when there are no transmission signals also in this period, a transmission right is given to the communication station. In the shown example, after the inter frame space DIFS, the
communication station # 0, which has the random backoff set to be shorter than that of the other peripheral stations, acquires the transmission right to be able to start a data transmission to thecommunication station # 1. - That is, the
communication station # 0, which transmits data, transmits a transmission request packet (RTS) to thecommunication station # 1. On the other hand, thecommunication station # 1 being the reception destination returns a confirmation note (CTS) to thecommunication station # 0 after a shorter inter frame space Short IFS (SIFS). - Now, at the time of an RTS packet, the
communication station # 0 transmits a first decoding portion corresponding to the PHY header according to a first communication method, which all communication stations can receive, and transmits a second decoding portion corresponding to the MAC frame according to a second communication method, which only the high-grade communication stations can receive. Then, the transmission sourcecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until an CTS packet. - Alternatively, the transmission source
communication station # 0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, thecommunication station # 0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, thecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration for which communications are desired to be stopped. - The
communication station # 2 as a conventional station can hear the SIGNAL portion of the RTS packet from thecommunication station # 0, and set a packet length and a transmission rate different from the actual state to perform a reception operation for a period of time corresponding to (packet length)/(rate). The RTS packet from thecommunication station # 0 is not transmitted for a period of (packet length)/(rate), but thecommunication station # 2 tries to receive the data packet and do not start any transmissions. As a result, thecommunication station # 2 restrains its transmission until the transmission of the CTS packet is completed. Moreover, because the rate and the packet length are different from the real transmission of the packet, the rate and the packet cannot be normally decoded, and thecommunication station # 2 destroys the packet to transmitted according to the second communication method after that. - Moreover, the reception destination
communication station # 1 transmits the first decoding portion corresponding to the PHY header according to the first communication method, which all communication station can receive, at the time of a transmission of a CTS packet, and transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, thecommunication station # 1 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration until the data packet. - Alternatively, the reception destination communication station ill transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system which each high-grade communication station knows but the first communication stations do not know. After that, the reception destination
communication station # 1 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the reception destinationcommunication station # 1 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the data packet for which communications are desired to be stopped. - The
communication station # 3 as the conventional station can hear the SIGNAL portion of the CTS packet from thecommunication station # 1, and sets a packet length and a transmission rate different from the actual state to perform reception for a period of time corresponding to (packet length)/(rate). The CTS packet from thecommunication station # 1 is not transmitted for a period of (packet length)/(rate), but thecommunication station # 3 tries to receive the CTS packet and do not start any transmissions. As a result, thecommunication station # 3 restrains its transmission until the completion of the transmission of the data packet. Moreover, because the rate and the packet length are different from the real transmission of the packet, the rate and the packet length cannot be normally decoded, and thecommunication station # 3 destroy the packet to be transmitted after that according to the second communication method. - Then the
communication station # 0 starts the transmission of a data packet in response to the reception of the CTS packet after the inter frame space SIFS. - At the data transmission, the transmission source
communication station # 0 transmits the first decoding portion corresponding to the PHY header according to the first communication method, which all communication stations can receive, and also transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the transmission sourcecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may be equal to the duration of Duration until the ACK packet, and sets a spoofed flag indicating the spoofing. - Alternatively, the transmission source
communication station # 0 transmits the SIGNAL portion in the PHY header according to the first communication method, which all communication stations can receive, and successively transmits the SIGNAL-2 portion modulated according to a modulation system, which each high-grade communication station knows but the first communication stations do not know. After that, the transmission sourcecommunication station # 0 transmits the second decoding portion corresponding to the MAC frame according to the second communication method, which only the high-grade communication stations can receive. Then, the transmission sourcecommunication station # 0 performs the spoofing of the information of the transmission rate (Rate) and the packet length (Length) in the SIGNAL portion of the PHY header in order that the value of (packet length)/(rate) may equal to the duration until the ACK packet for which communications are desired to be stopped. - The
communication station # 2 as a conventional station can hear the SIGNAL portion of the RTS packet from thecommunication station # 0, and set a packet length and a transmission rate different from the actual state to perform a reception operation for a period of time corresponding to (packet length)/(rate). The data packet from thecommunication station # 0 is not transmitted for a period of (packet length)/(rate), but thecommunication station # 2 tries to receive the data packet and do not start any transmissions. As a result, thecommunication station # 2 restrains its transmission until the transmission of the ACK packet is completed. Moreover, because the rate and the packet length are different from the real transmission of the packet, the rate and the packet cannot be normally decoded, and thecommunication station # 2 destroys the packet to transmitted according to the second communication method after that. - When the
communication station # 1 detects the spoofing of the information of the packet length and the rate of a SIGNAL portion on the basis of the spoofed flag, thecommunication station # 1 destroys the information. Furthermore, thecommunication station # 1 receives the MAC frame as the successive second decoding portion at the corresponding transmission rate, and performs the reception operation of the data addressed to the local station for the duration of Duration described in the MAC header. Then, when the reception of the data packet from thecommunication station # 0 is completed, thecommunication station # 1 returns an ACK packet to the data transmission sourcecommunication station # 0 after the inter frame space SIFS. - As described above, when a concealed terminal receives at least one of the RTS and the CTS, the concealed terminal sets a transmission stop duration of the local station for the duration in which the transmission of the next packet is expected to be completed, and thereby collisions can be avoided.
- As described above, in the present embodiment, the high-grade communication stations perform the spoofing of the description of the SIGNAL portion of the PHY header, and provide the transmission stop duration to the conventional stations until a transaction according to the high-grade communication method ends to obtain compatibility. That is, the conventional stations unable to deal with the high-grade communication method stop their transmissions for the duration in which the transmission of the next packet is expected to end, and thereby collisions can be avoided.
- In the examples shown in
FIGS. 8 and 9 , in a communication procedure executed according to the second communication method, the spoofing of the description of the SIGNAL portion is performed in order that the conventional stations may stop their transmission operations for the duration until the ACK transmission ends. Moreover, when a packet transmission is performed according to a communication procedure to perform multiple connections with a plurality of communication stations in the MAC frame according to the second communication system, the ACK (response packet) transmission is performed in a time division multiplex from each remote station. Also in this case, the above mentioned mechanism can be applied. Moreover, the transmission of the ACK packet hereupon is not limited to the case of single ACK packet, but includes, for example, the case where the ACK packet is multiplexed with other kinds of packets such as an RTS packet, a CTS packet and data packet to be transmitted. -
FIG. 17 shows communication operation sequencing in which a plurality of reception stations replies by a response packet in time division to a transmission packet from a transmission station. - A
packet # 0 transmitted from thecommunication station # 0 is supposed to request a reply from thecommunication station # 1 and thecommunication station # 2 severally. Thepacket # 0 notifies thecommunication station # 1 and thecommunication station # 2 of the timing of the transmissions of their response packets lest the response packets should collide. - At this time, the value of (packet length)/(rate) of the SIGNAL portion of the
packet # 0 is set to be the time when the receptions of all response packets have been completed. Thereby, it is prevented that thecommunication station # 3 locating at a position distant from thecommunication station # 1 andcommunication station # 2 to the degree of unable to receiving the response packets from thecommunication stations # 1 and #2 disturbs the responses. Because the SIGNAL portion is transmitted at the lowest rate, such setting is effective to eliminate such a concealed terminal. - Incidentally, Japanese Patent Application No. 2003297919, which has been assigned to the present applicant already, discloses a communication system in which a transmission station transmits a data frame addressed to a plurality of reception stations in the space division multiple access (SDMA) and each reception station reply by ACK in the time division multiplex.
- In the above, specific embodiments have been referred to while the present invention has been described in detail. However, it is clear that the person skilled in the art can modify and substitute the embodiments without departing from the scope and spirit of the present invention. That is, the present invention has been disclosed in the form of exemplifying, and the contents of the description of the present specification should not be interpreted limitedly. For the judgment of the subject matter of the present invention, claims should be considered.
- This application is related to Japanese Priority Document No. 2004-196837, filed on Jul. 2, 2004 with the Japanese Patent Office, which document is hereby incorporated by reference.
- Obviously, numerous modifications and variations of the present invention are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.
Claims (11)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/463,302 US9351319B2 (en) | 2004-01-08 | 2014-08-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US15/132,533 US9730109B2 (en) | 2004-01-08 | 2016-04-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US15/382,775 US9723632B2 (en) | 2004-01-08 | 2016-12-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US15/633,805 US10440749B2 (en) | 2004-01-08 | 2017-06-27 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-003530 | 2004-01-08 | ||
JP2004003530 | 2004-01-08 | ||
US10/910,646 US7542453B2 (en) | 2004-01-08 | 2004-08-04 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US12/426,478 US7768985B2 (en) | 2004-01-08 | 2009-04-20 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US12/769,432 US8228941B2 (en) | 2004-01-08 | 2010-04-28 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/489,036 US8467410B2 (en) | 2004-01-08 | 2012-06-05 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/891,570 US8837520B2 (en) | 2004-01-08 | 2013-05-10 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US14/463,302 US9351319B2 (en) | 2004-01-08 | 2014-08-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/891,570 Continuation US8837520B2 (en) | 2004-01-08 | 2013-05-10 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/132,533 Continuation US9730109B2 (en) | 2004-01-08 | 2016-04-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140362844A1 true US20140362844A1 (en) | 2014-12-11 |
US9351319B2 US9351319B2 (en) | 2016-05-24 |
Family
ID=34737155
Family Applications (16)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/910,646 Active 2026-11-07 US7542453B2 (en) | 2004-01-08 | 2004-08-04 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US12/426,478 Expired - Lifetime US7768985B2 (en) | 2004-01-08 | 2009-04-20 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US12/769,432 Expired - Fee Related US8228941B2 (en) | 2004-01-08 | 2010-04-28 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US12/769,407 Expired - Lifetime US7983296B2 (en) | 2004-01-08 | 2010-04-28 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/489,036 Expired - Lifetime US8467410B2 (en) | 2004-01-08 | 2012-06-05 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/891,570 Expired - Lifetime US8837520B2 (en) | 2004-01-08 | 2013-05-10 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,556 Expired - Lifetime US8737428B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,604 Expired - Lifetime US8743902B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,596 Expired - Lifetime US8750327B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,524 Expired - Lifetime US8737427B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,539 Expired - Lifetime US8750326B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,789 Expired - Lifetime US8638812B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US14/463,302 Expired - Fee Related US9351319B2 (en) | 2004-01-08 | 2014-08-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US15/132,533 Expired - Lifetime US9730109B2 (en) | 2004-01-08 | 2016-04-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US15/382,775 Expired - Lifetime US9723632B2 (en) | 2004-01-08 | 2016-12-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US15/633,805 Expired - Lifetime US10440749B2 (en) | 2004-01-08 | 2017-06-27 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
Family Applications Before (12)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/910,646 Active 2026-11-07 US7542453B2 (en) | 2004-01-08 | 2004-08-04 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US12/426,478 Expired - Lifetime US7768985B2 (en) | 2004-01-08 | 2009-04-20 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US12/769,432 Expired - Fee Related US8228941B2 (en) | 2004-01-08 | 2010-04-28 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US12/769,407 Expired - Lifetime US7983296B2 (en) | 2004-01-08 | 2010-04-28 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/489,036 Expired - Lifetime US8467410B2 (en) | 2004-01-08 | 2012-06-05 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/891,570 Expired - Lifetime US8837520B2 (en) | 2004-01-08 | 2013-05-10 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,556 Expired - Lifetime US8737428B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,604 Expired - Lifetime US8743902B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,596 Expired - Lifetime US8750327B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,524 Expired - Lifetime US8737427B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,539 Expired - Lifetime US8750326B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US13/963,789 Expired - Lifetime US8638812B2 (en) | 2004-01-08 | 2013-08-09 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/132,533 Expired - Lifetime US9730109B2 (en) | 2004-01-08 | 2016-04-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US15/382,775 Expired - Lifetime US9723632B2 (en) | 2004-01-08 | 2016-12-19 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US15/633,805 Expired - Lifetime US10440749B2 (en) | 2004-01-08 | 2017-06-27 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
Country Status (1)
Country | Link |
---|---|
US (16) | US7542453B2 (en) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7853250B2 (en) | 2003-04-03 | 2010-12-14 | Network Security Technologies, Inc. | Wireless intrusion detection system and method |
US7542453B2 (en) | 2004-01-08 | 2009-06-02 | Sony Corporation | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US7664130B2 (en) | 2004-03-01 | 2010-02-16 | Sony Corporation | Wireless communication system, wireless communication apparatus, wireless communication method and computer program |
DE102004047746A1 (en) * | 2004-09-30 | 2006-04-27 | Siemens Ag | Method for implementing a connection adaptation in a MIMO-OFDM transmission system |
JP2006197045A (en) * | 2005-01-12 | 2006-07-27 | Nec Corp | System, and terminal for transmitting radio packet signal, and method for same used therefor |
US20100014430A1 (en) * | 2005-01-18 | 2010-01-21 | Matsushita Electric Industrial Co., Ltd. | Resource allocation method and base station device |
US7768988B2 (en) * | 2005-02-22 | 2010-08-03 | Intel Corporation | Method and apparatus to perform network medium reservation in a wireless network |
US7792227B2 (en) * | 2005-03-02 | 2010-09-07 | Broadcom Corporation | Carrier detection for multiple receiver systems |
US20060262758A1 (en) * | 2005-05-17 | 2006-11-23 | Sumeet Sandhu | Distributed communications for wireless networks |
US7532638B2 (en) * | 2005-06-01 | 2009-05-12 | Broadcom Corporation | Wireless terminal baseband processor high speed turbo decoding module supporting MAC header splitting |
JP4364165B2 (en) * | 2005-06-17 | 2009-11-11 | 株式会社東芝 | Wireless communication device |
EP1969757A4 (en) * | 2005-12-13 | 2012-10-24 | Xocyst Transfer Ag L L C | Dual cts protection systems and methods |
US20070171933A1 (en) * | 2006-01-23 | 2007-07-26 | Interdigital Technology Corporation | Medium access control and physical layer headers for high throughput data in wlan systems |
US8320358B2 (en) * | 2007-12-12 | 2012-11-27 | Qualcomm Incorporated | Method and apparatus for resolving blinded-node problems in wireless networks |
JP5197042B2 (en) * | 2008-02-05 | 2013-05-15 | キヤノン株式会社 | Communication apparatus, communication system, and network construction method |
JP2010206730A (en) | 2009-03-05 | 2010-09-16 | Sony Corp | Wireless communication apparatus and wireless communication method |
US8369351B2 (en) * | 2009-04-06 | 2013-02-05 | Intel Corporation | Method and apparatus for collision avoidance |
US9113476B2 (en) | 2009-05-12 | 2015-08-18 | Datalogic Scanning Group S.R.L. | Method to perform a wireless communication in a data collection system |
DE102009040035B4 (en) * | 2009-09-03 | 2014-04-03 | Siemens Aktiengesellschaft | transfer process |
JP5515558B2 (en) * | 2009-09-25 | 2014-06-11 | ソニー株式会社 | COMMUNICATION SYSTEM, RELAY DEVICE, AND COMMUNICATION DEVICE |
US8571494B2 (en) * | 2010-01-22 | 2013-10-29 | Qualcomm Incorporated | Method and apparatus for establishing communications in low signal to noise ratio environments |
JP5625395B2 (en) * | 2010-03-03 | 2014-11-19 | ソニー株式会社 | Wireless communication apparatus, wireless communication method, and wireless communication system |
US8743908B2 (en) * | 2010-04-20 | 2014-06-03 | Texas Instruments Incorporated | Coexistence of prime, S-FSK and G3 devices in powerline communications |
US20120020269A1 (en) * | 2010-07-20 | 2012-01-26 | Gong Michelle X | Media access techniques for multiple user transmissions |
US8837478B1 (en) * | 2010-07-23 | 2014-09-16 | Marvell International Ltd. | System and method for interference protection in downlink multi-user multiple-input, multiple-output communication |
US8665974B2 (en) | 2011-02-10 | 2014-03-04 | Marvell World Trade Ltd. | Multi-clock PHY preamble design and detection |
US9674317B2 (en) | 2011-02-10 | 2017-06-06 | Marvell World Trade Ltd. | Multi-clock PHY preamble design and detection |
US8767570B2 (en) * | 2011-02-14 | 2014-07-01 | Nokia Corporation | Indicating status of radio resources in wireless network |
US9342095B2 (en) * | 2011-03-02 | 2016-05-17 | Rambus Inc. | Timing calibration for multimode I/O systems |
US9173228B2 (en) * | 2011-06-28 | 2015-10-27 | Qualcomm Incorporated | Bluetooth packet scheduling rules for LTE coexistence |
JP5665694B2 (en) | 2011-08-26 | 2015-02-04 | 株式会社東芝 | Wireless communication device |
EP2712138A3 (en) * | 2012-09-24 | 2014-06-18 | ST-Ericsson SA | Interference cancellation technique for channel estimation in ofdm receivers |
US10187813B2 (en) * | 2014-06-25 | 2019-01-22 | Qualcomm Incorporated | Systems and methods for improved protection modes in high-efficiency wireless networks |
JP6401523B2 (en) | 2014-07-04 | 2018-10-10 | キヤノン株式会社 | COMMUNICATION DEVICE, TERMINAL DEVICE, ITS CONTROL METHOD AND PROGRAM, AND NETWORK PROCESSING SYSTEM |
US20160183279A1 (en) * | 2014-12-19 | 2016-06-23 | Mediatek Inc. | Time Division Multiplex System and Transmission Method Thereof |
US9806977B2 (en) * | 2015-11-04 | 2017-10-31 | Nxp Usa, Inc. | Multi-rate overlay mode in wireless communication systems |
US10015174B2 (en) | 2016-03-16 | 2018-07-03 | Qualcomm Incorporated | Using communication characteristics of a station to verify identity information |
US10356719B2 (en) | 2016-06-24 | 2019-07-16 | Microsoft Technology Licensing, Llc | Skip-correlation based symmetric carrier sensing with multiple power levels |
WO2018143148A1 (en) * | 2017-01-31 | 2018-08-09 | 興和株式会社 | Camera manipulation device |
US10887051B2 (en) * | 2019-01-03 | 2021-01-05 | Qualcomm Incorporated | Real time MIC recovery |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6349110B1 (en) * | 1997-02-24 | 2002-02-19 | Golden Bridge Technology, Inc. | Subsystem and method for combining spread-spectrum multipath signals |
Family Cites Families (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7274652B1 (en) | 2000-06-02 | 2007-09-25 | Conexant, Inc. | Dual packet configuration for wireless communications |
US6118825A (en) * | 1997-08-11 | 2000-09-12 | Sony Corporation | Digital data transmission device and method, digital data demodulation device and method, and transmission medium |
US7054296B1 (en) * | 1999-08-04 | 2006-05-30 | Parkervision, Inc. | Wireless local area network (WLAN) technology and applications including techniques of universal frequency translation |
US6907020B2 (en) | 2000-01-20 | 2005-06-14 | Nortel Networks Limited | Frame structures supporting voice or streaming communications with high speed data communications in wireless access networks |
DE60124521T2 (en) * | 2000-04-07 | 2007-09-06 | Broadcom Corp., Irvine | FRAME-BASED TRANSFER OF USER DATA WITH CHANGING DATA RATE |
EP1338125A2 (en) * | 2000-11-03 | 2003-08-27 | AT & T Corp. | Tiered contention multiple access (tcma): a method for priority-based shared channel access |
US7106709B2 (en) * | 2000-11-29 | 2006-09-12 | Telefonaktiebologet Lm Ericsson (Publ) | Timing drift compensation in wireless packet-based systems |
JP2002198974A (en) | 2000-12-26 | 2002-07-12 | Matsushita Electric Ind Co Ltd | Radio connection device |
US7031274B2 (en) * | 2001-01-16 | 2006-04-18 | At&T Corp. | Method for enabling interoperability between data transmission systems conforming to IEEE 802.11 and HIPERLAN standards |
US7305004B2 (en) * | 2001-01-16 | 2007-12-04 | At&T Corp. | Interference suppression methods for 802.11 |
CA2439697C (en) * | 2001-03-02 | 2007-11-13 | At&T Corp. | Interference suppression methods for 802.11 |
US7277413B2 (en) * | 2001-07-05 | 2007-10-02 | At & T Corp. | Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation |
US7394864B2 (en) * | 2001-07-06 | 2008-07-01 | Conexant, Inc. | Mixed waveform configuration for wireless communications |
US6754195B2 (en) | 2001-07-06 | 2004-06-22 | Intersil Americas Inc. | Wireless communication system configured to communicate using a mixed waveform configuration |
EP1433291B1 (en) * | 2001-09-27 | 2007-09-05 | Telefonaktiebolaget LM Ericsson (publ) | Method for multihop routing for distributed wlan networks |
US7170880B2 (en) * | 2001-10-16 | 2007-01-30 | Conexant, Inc. | Sample rate change between single-carrier and multi-carrier waveforms |
US7180905B2 (en) | 2001-11-02 | 2007-02-20 | At & T Corp. | Access method for periodic contention-free sessions |
US20030128659A1 (en) | 2002-01-09 | 2003-07-10 | Koninklijke Philips Electronics N.V. | Coexistence of OFDM and DSSS/CCK stations in a WLAN |
CN104283832B (en) | 2002-03-08 | 2018-06-19 | 英特尔公司 | For the system and method for high rate OFDM communications |
US7953820B2 (en) * | 2002-09-11 | 2011-05-31 | Hughes Network Systems, Llc | Method and system for providing enhanced performance of web browsing |
US9014196B2 (en) * | 2002-09-17 | 2015-04-21 | Broadcom Corporation | System and method for providing a super channel in a multi-band multi-protocol hybrid wired/wireless network |
US7046651B2 (en) * | 2003-04-04 | 2006-05-16 | Nokia Corporation | System topologies for optimum capacity transmission over wireless local area networks |
US8014374B2 (en) * | 2003-04-07 | 2011-09-06 | Bellow Bellows Llc | System and method for achieving timing compatibility with multi-antenna wireless data protocols |
JP4836784B2 (en) | 2003-06-30 | 2011-12-14 | アギア システムズ インコーポレーテッド | Method and apparatus for backward compatible communication in a multi-antenna communication system using a preamble structure based on FDM |
US7039412B2 (en) * | 2003-08-08 | 2006-05-02 | Intel Corporation | Method and apparatus for transmitting wireless signals on multiple frequency channels in a frequency agile network |
US7440510B2 (en) | 2003-09-15 | 2008-10-21 | Intel Corporation | Multicarrier transmitter, multicarrier receiver, and methods for communicating multiple spatial signal streams |
US7315577B2 (en) | 2003-09-15 | 2008-01-01 | Intel Corporation | Multiple antenna systems and method using high-throughput space-frequency block codes |
US8233462B2 (en) * | 2003-10-15 | 2012-07-31 | Qualcomm Incorporated | High speed media access control and direct link protocol |
US8842657B2 (en) * | 2003-10-15 | 2014-09-23 | Qualcomm Incorporated | High speed media access control with legacy system interoperability |
US7443823B2 (en) * | 2003-11-06 | 2008-10-28 | Interdigital Technology Corporation | Access points with selective communication rate and scheduling control and related methods for wireless local area networks (WLANs) |
US20060007898A1 (en) | 2003-12-23 | 2006-01-12 | Maltsev Alexander A | Method and apparatus to provide data packet |
US7542453B2 (en) | 2004-01-08 | 2009-06-02 | Sony Corporation | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US7535879B2 (en) * | 2004-01-08 | 2009-05-19 | Sony Corporation | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
US7665008B2 (en) | 2004-01-12 | 2010-02-16 | Intel Corporation | Method and apparatus for implementing a low density parity check code in a wireless system |
US7570953B2 (en) | 2004-01-12 | 2009-08-04 | Intel Corporation | Multicarrier communication system and methods for link adaptation using uniform bit loading and subcarrier puncturing |
US7345989B2 (en) | 2004-01-12 | 2008-03-18 | Intel Corporation | Adaptive channelization scheme for high throughput multicarrier systems |
US7289585B2 (en) | 2004-01-12 | 2007-10-30 | Intel Corporation | Multicarrier receivers and methods for separating transmitted signals in a multiple antenna system |
US7333556B2 (en) | 2004-01-12 | 2008-02-19 | Intel Corporation | System and method for selecting data rates to provide uniform bit loading of subcarriers of a multicarrier communication channel |
US7324605B2 (en) | 2004-01-12 | 2008-01-29 | Intel Corporation | High-throughput multicarrier communication systems and methods for exchanging channel state information |
US7423968B2 (en) | 2004-01-12 | 2008-09-09 | Intel Corporation | Systems and methods to convey additional signaling information in a wireless local area network |
US20050152330A1 (en) | 2004-01-12 | 2005-07-14 | Stephens Adrian P. | Clock recovery methods and apparatus |
US7395495B2 (en) | 2004-01-12 | 2008-07-01 | Intel Corporation | Method and apparatus for decoding forward error correction codes |
US7440423B2 (en) | 2004-01-12 | 2008-10-21 | Intel Corporation | Channel specification apparatus, systems, and methods |
US7474608B2 (en) | 2004-01-12 | 2009-01-06 | Intel Corporation | Method for signaling information by modifying modulation constellations |
US7680150B2 (en) | 2004-04-13 | 2010-03-16 | Texas Instruments Incorporated | Virtual clear channel avoidance (CCA) mechanism for wireless communications |
US20050288062A1 (en) | 2004-06-23 | 2005-12-29 | Hammerschmidt Joachim S | Method and apparatus for selecting a transmission mode based upon packet size in a multiple antenna communication system |
US7974225B2 (en) * | 2007-05-30 | 2011-07-05 | Intel Corporation | Providing extended range modes as part of the 802.11n standard |
-
2004
- 2004-08-04 US US10/910,646 patent/US7542453B2/en active Active
-
2009
- 2009-04-20 US US12/426,478 patent/US7768985B2/en not_active Expired - Lifetime
-
2010
- 2010-04-28 US US12/769,432 patent/US8228941B2/en not_active Expired - Fee Related
- 2010-04-28 US US12/769,407 patent/US7983296B2/en not_active Expired - Lifetime
-
2012
- 2012-06-05 US US13/489,036 patent/US8467410B2/en not_active Expired - Lifetime
-
2013
- 2013-05-10 US US13/891,570 patent/US8837520B2/en not_active Expired - Lifetime
- 2013-08-09 US US13/963,556 patent/US8737428B2/en not_active Expired - Lifetime
- 2013-08-09 US US13/963,604 patent/US8743902B2/en not_active Expired - Lifetime
- 2013-08-09 US US13/963,596 patent/US8750327B2/en not_active Expired - Lifetime
- 2013-08-09 US US13/963,524 patent/US8737427B2/en not_active Expired - Lifetime
- 2013-08-09 US US13/963,539 patent/US8750326B2/en not_active Expired - Lifetime
- 2013-08-09 US US13/963,789 patent/US8638812B2/en not_active Expired - Lifetime
-
2014
- 2014-08-19 US US14/463,302 patent/US9351319B2/en not_active Expired - Fee Related
-
2016
- 2016-04-19 US US15/132,533 patent/US9730109B2/en not_active Expired - Lifetime
- 2016-12-19 US US15/382,775 patent/US9723632B2/en not_active Expired - Lifetime
-
2017
- 2017-06-27 US US15/633,805 patent/US10440749B2/en not_active Expired - Lifetime
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6349110B1 (en) * | 1997-02-24 | 2002-02-19 | Golden Bridge Technology, Inc. | Subsystem and method for combining spread-spectrum multipath signals |
Also Published As
Publication number | Publication date |
---|---|
US20130322421A1 (en) | 2013-12-05 |
US20130329717A1 (en) | 2013-12-12 |
US20120243522A1 (en) | 2012-09-27 |
US20100208714A1 (en) | 2010-08-19 |
US20130329827A1 (en) | 2013-12-12 |
US7542453B2 (en) | 2009-06-02 |
US8467410B2 (en) | 2013-06-18 |
US20170303315A1 (en) | 2017-10-19 |
US8837520B2 (en) | 2014-09-16 |
US20130329641A1 (en) | 2013-12-12 |
US8750327B2 (en) | 2014-06-10 |
US9351319B2 (en) | 2016-05-24 |
US20130329716A1 (en) | 2013-12-12 |
US8228941B2 (en) | 2012-07-24 |
US8737428B2 (en) | 2014-05-27 |
US8638812B2 (en) | 2014-01-28 |
US20130322420A1 (en) | 2013-12-05 |
US20170099681A1 (en) | 2017-04-06 |
US20100208713A1 (en) | 2010-08-19 |
US20090201901A1 (en) | 2009-08-13 |
US9723632B2 (en) | 2017-08-01 |
US7768985B2 (en) | 2010-08-03 |
US10440749B2 (en) | 2019-10-08 |
US8737427B2 (en) | 2014-05-27 |
US8743902B2 (en) | 2014-06-03 |
US20130242970A1 (en) | 2013-09-19 |
US20050153735A1 (en) | 2005-07-14 |
US7983296B2 (en) | 2011-07-19 |
US8750326B2 (en) | 2014-06-10 |
US9730109B2 (en) | 2017-08-08 |
US20160234721A1 (en) | 2016-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10440749B2 (en) | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program | |
US7535879B2 (en) | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program | |
JP4572932B2 (en) | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program | |
EP2242319B1 (en) | Packet configuration for the coexistence of stations in a multistandard wireless LAN |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240524 |